Impact
OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in the Feishu allowFrom allowlist implementation that accepts mutable sender display names instead of enforcing ID-only matching. An attacker can set a display name equal to an allowlisted ID string to bypass authorization checks and gain unauthorized access. The primary impact is the attacker achieving unauthorized access to the system, potentially compromising confidential data and system integrity.
Affected Systems
Affectees include OpenClaw software with any version earlier than 2026.2.22. No further version granularity is specified, so all installations of OpenClaw pre‑2026.2.22 are impacted.
Risk and Exploitability
The CVSS score is 6.3, indicating a moderate risk level. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker can exploit this remotely by sending a crafted request that includes a display name mimicking an allowlisted ID, thereby elevating privileges and bypassing authentication.
OpenCVE Enrichment
Github GHSA