Description
OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the Google Chat and Zalouser extensions where route-level group allowlist policies silently downgrade to open policy. Attackers can exploit this policy resolution flaw to bypass sender restrictions and interact with bots despite configured allowlist restrictions.
Published: 2026-03-31
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: Policy Bypass
Action: Patch Now
AI Analysis

Impact

The vulnerability allows attackers to bypass sender policy allowlists set for the Google Chat and Zalouser extensions in OpenClaw. By triggering a route‑level group allowlist downgrade, the application silently falls back to an open policy, enabling the attacker to send messages to bots that would normally be blocked. This flaw permits unauthorized interaction with bots, potentially leading to misuse or misdirection of bot functionality.

Affected Systems

OpenClaw applications running versions prior to 2026.3.28 that include the Google Chat or Zalouser extensions are susceptible. Any user of the affected OpenClaw deployment that relies on sender policies for bot access could be impacted. The issue resides in the core OpenClaw product and does not affect other products or services directly.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting a lower public exploitation risk at present. However, the attack can be carried out remotely by crafting messages that exploit the policy downgrade, and successful exploitation would allow the attacker to interact with bots without proper authorization. Based on the description, the likely vector is remote attacker sending messages to trigger the downgrade, resulting in unauthorized bot communication.

Generated by OpenCVE AI on March 31, 2026 at 15:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.3.28 or later.
  • Verify that sender policy allowlists are actively enforced and not silently overridden in the configuration.
  • Monitor chat logs for unexpected bot interactions to detect potential exploitation.

Generated by OpenCVE AI on March 31, 2026 at 15:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-63mg-xp9j-jfcm OpenClaw: Google Chat and Zalouser group sender allowlist bypass via policy downgrade
History

Tue, 31 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Tue, 31 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the Google Chat and Zalouser extensions where route-level group allowlist policies silently downgrade to open policy. Attackers can exploit this policy resolution flaw to bypass sender restrictions and interact with bots despite configured allowlist restrictions.
Title OpenClaw < 2026.3.28 - Sender Policy Allowlist Bypass via Policy Downgrade in Google Chat and Zalouser Extensions
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-01T03:55:24.751Z

Reserved: 2026-03-23T11:00:48.408Z

Link: CVE-2026-33578

cve-icon Vulnrichment

Updated: 2026-03-31T14:51:01.236Z

cve-icon NVD

Status : Received

Published: 2026-03-31T15:16:14.757

Modified: 2026-03-31T18:16:54.340

Link: CVE-2026-33578

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:38:27Z

Weaknesses