Impact
OpenClaw versions prior to 2026.2.25 fail to enforce dmPolicy and allowFrom authorization checks when processing Discord direct‑message reaction notifications, allowing any user to react to bot‑authored DM messages and enqueue reaction‑derived system events. The missing checks enable an attacker to bypass DM authorization restrictions and trigger downstream automation or tool policies, effectively compromising control over automated actions. This weakness is an example of improper authorization (CWE‑863).
Affected Systems
The vulnerability affects all OpenClaw deployments running a version older than 2026.2.25. The affected product is identified by the CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*, meaning any Node.js environment with the OpenClaw package in that version range.
Risk and Exploitability
The CVSS score of 6.3 indicates moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is remote: an attacker only needs to react to a bot‐generated Discord DM message, which does not require privileged local access and can be performed over the public internet where the OpenClaw instance receives Discord events.
OpenCVE Enrichment
Github GHSA