Impact
The vulnerability is a failure to enforce sender authorization checks for interactive callbacks, including block_action, view_submission, and view_closed, in shared workspace deployments. Unauthorized workspace members can bypass allowFrom restrictions and channel user allowlists to enqueue system‑event text into active sessions. This indicates a permission check failure (CWE-863) that could be used to inject or manipulate messages in the workspace, thereby compromising the integrity of communication and potentially enabling further malicious actions.
Affected Systems
OpenClaw, all versions prior to 2026.2.25 are affected. The issue applies to installations using the shared workspace deployment model.
Risk and Exploitability
With a CVSS score of 7.6 the vulnerability is of high impact, though the EPSS score is not available. It is not listed in CISA’s KEV catalog. The attack vector is an authenticated but unauthorized workspace member, so it requires access to the workspace but not external network exploitation. The risk is moderate to high for any environment in which unauthorized members could exist within shared workspaces.
OpenCVE Enrichment
Github GHSA