Description
OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in Discord guild reaction ingestion that fails to enforce member users and roles allowlist checks. Non-allowlisted guild members can trigger reaction events accepted as trusted system events, injecting reaction text into downstream session context.
Published: 2026-03-29
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass in Discord Guild Reaction Handling
Action: Apply Patch
AI Analysis

Impact

OpenClaw versions prior to 2026.3.11 allow an attacker to bypass authorized user and role allowlist checks when processing Discord guild reaction events. As a result, reactions created by non‑allowlisted members are accepted as trusted events and their reaction text is injected into the bot’s downstream session context. This enables malicious actors to alter session data, potentially leading to unintended command execution, data manipulation, or the spread of spam or malicious content within the guild’s context.

Affected Systems

The vulnerability affects all deployments of the OpenClaw application, a Node.js based Discord bot. Any installation running a version earlier than 2026.3.11 is susceptible. The issue arises when the bot ingests reaction events from Discord guilds without properly validating the reaction author against configured allowlists.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium impact assessment. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, suggesting no known widespread exploitation. Likely attackers would need to be a member of the target guild; by sending a crafted reaction to a channel the bot monitors, they can trigger the vulnerable code path and inject payloads as part of the session context. Exploitability is moderate, requiring only access to the guild’s Discord interface rather than system-level privileges.

Generated by OpenCVE AI on March 29, 2026 at 14:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.3.11 or later
  • Verify that your deployment is running a patched version before applying any changes
  • If a patch is unavailable, restrict the bot’s reaction handling to allowlisted guild members or remove reaction processing for untrusted guilds
  • Monitor Discord activity logs for unexpected reaction events and investigate anomalous session context injections

Generated by OpenCVE AI on March 29, 2026 at 14:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 29 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in Discord guild reaction ingestion that fails to enforce member users and roles allowlist checks. Non-allowlisted guild members can trigger reaction events accepted as trusted system events, injecting reaction text into downstream session context.
Title OpenClaw < 2026.3.11 - Authorization Bypass in Discord Guild Reaction Allowlist Enforcement
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-30T14:34:11.543Z

Reserved: 2026-03-16T21:19:31.966Z

Link: CVE-2026-32923

cve-icon Vulnrichment

Updated: 2026-03-30T14:34:03.579Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-29T13:17:00.767

Modified: 2026-03-31T18:01:13.063

Link: CVE-2026-32923

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T06:58:23Z

Weaknesses