Impact
OpenClaw’s handling of Discord voice transcripts in versions prior to 2026.3.2 fails to pass the senderIsOwner flag when processing transcripts in agentCommand. The missing flag defaults to true, causing the application to treat non‑owner participants in mixed‑trust voice channels as the channel owner. This flaw allows an attacker who can send a voice transcript to invoke owner‑exclusive tools such as gateway and cron functionality, effectively granting elevated privileges. The vulnerability is classified as CWE‑863, Missing or Incorrect Permission Levels, and compromises integrity by enabling unauthorized command execution.
Affected Systems
OpenClaw versions earlier than 2026.3.2 are affected. The issue exists in all builds prior to the 2026.3.2 release, regardless of platform or deployment context.
Risk and Exploitability
The CVSS score of 5.8 places the vulnerability in the medium severity range. An EPSS score is not available, making the precise exploitation likelihood uncertain. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to be present in a mixed‑trust Discord voice channel and to deliver a transcript that triggers agentCommand; once the attacker has that capability the exploit path is straightforward, given the default flag behavior. No public exploits have been reported, but the medium severity combined with the potential for owner‑level command execution warrants prompt action and monitoring.
OpenCVE Enrichment
Github GHSA