Impact
OpenClaw versions 2026.2.22 and 2026.2.23 contain an authorization bypass vulnerability in the Synology Chat plugin. The bug arises when the dmPolicy is set to allowlist but the allowedUserIds list is empty, causing the system to fail the intended access check. Attackers who possess Synology sender privileges can exploit this flaw to trigger unauthorized agent dispatch and downstream tool actions. This flaw is classified as a CWE‑863 (Authorization Bypass Through User-Controlled Key).
Affected Systems
The affected vendor is OpenClaw, product OpenClaw. The vulnerability was present in versions 2026.2.22 and 2026.2.23 and has been fixed in 2026.2.24; the affected CPE is cpe:2.3:a:openclawopenclaw:*:*:*:*:*:node.js:*:*.
Risk and Exploitability
The CVSS base score is 8.3, indicating medium to high severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires legitimate Synology sender access and does not require additional user interaction; once authenticated, a malicious user can circumvent authorization checks and execute privileged actions within OpenClaw. The attack vector is likely remote, relying on specific application configuration (allowlist with no users) that can be validated and remedied by updating the software or adjusting configuration.
OpenCVE Enrichment
Github GHSA