Description
OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty groupAllowFrom parameter, the message handler synthesizes wildcard sender authorization, permitting any sender in the matched team/channel to trigger replies in allowlisted Teams routes.
Published: 2026-03-31
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized sender authorization bypass
Action: Upgrade
AI Analysis

Impact

The vulnerability resides in the Microsoft Teams plugin of OpenClaw versions prior to 2026.3.8. When a team or channel route allowlist is configured with an empty groupAllowFrom parameter, the message handler incorrectly treats any sender within the matched team or channel as authorized, allowing that sender to trigger replies in routes that are intended to be restricted. This results in unauthorized use of the Teams plugin and can lead to policy violations or tampering with automated responses. The weakness is an insufficient authorization check, identified as CWE‑863.

Affected Systems

The affected software is OpenClaw, specifically the OpenClaw application running on Node.js. All releases before 2026.3.8 are considered vulnerable; users of any such version should verify whether their deployment uses the problematic Teams route allowlist feature.

Risk and Exploitability

The CVSS score of 2.3 indicates a low severity assessment. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to be able to send messages in a Teams channel that is configured with a route allowlist containing an empty groupAllowFrom setting. This suggests the threat model focuses on internal or compromised users with access to the Teams channel, rather than external adversaries. The attack path involves sending a message that is treated as authorized and then triggering a back‑channel reply. While the condition is somewhat restrictive, it still permits unauthorized actors to override intended authorization controls within the Teams integration.

Generated by OpenCVE AI on March 31, 2026 at 12:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.3.8 or later, which removes the vulnerability.
  • Verify that all Teams route allowlist configurations specify a non‑empty groupAllowFrom parameter; if it must be empty, consider disabling the allowlist feature for that route.
  • Audit existing Teams routes for improper configuration and correct any that permit empty groupAllowFrom settings.
  • Monitor Teams message handling for unusual reply activity that may indicate abuse of the plugin.

Generated by OpenCVE AI on March 31, 2026 at 12:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Tue, 31 Mar 2026 11:45:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty groupAllowFrom parameter, the message handler synthesizes wildcard sender authorization, permitting any sender in the matched team/channel to trigger replies in allowlisted Teams routes.
Title OpenClaw < 2026.3.8 - Sender Allowlist Bypass in Microsoft Teams Plugin via Route Allowlist Configuration
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-31T18:03:44.336Z

Reserved: 2026-03-30T13:51:47.549Z

Link: CVE-2026-34506

cve-icon Vulnrichment

Updated: 2026-03-31T14:57:00.442Z

cve-icon NVD

Status : Received

Published: 2026-03-31T12:16:30.440

Modified: 2026-03-31T18:16:56.630

Link: CVE-2026-34506

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:38:55Z

Weaknesses