Impact
OpenClaw versions earlier than 2026.3.25 contain a flaw in the Google Chat group policy enforcement logic that allows an attacker to manipulate the mutable space display name. By changing or colliding a space’s displayName, a user can rebind group policies to a different space, thereby gaining unauthorized access to protected resources that would normally be restricted. The weakness can be classified as an authorization bypass, leading to a potential privilege escalation or data compromise.
Affected Systems
The product affected is OpenClaw. All installations of OpenClaw that are running a version before 2026.3.25 are impacted. No specific sub‑components are singled out beyond the Google Chat group policy feature.
Risk and Exploitability
The vulnerability carries a CVSS base score of 2.3, indicating a low overall impact. No EPSS value is published and the issue is not listed in CISA’s KEV catalog. The attack requires the ability to create or modify a Google Chat space and supply a new displayName that collides with an existing group policy. Based on the description, the likely attack vector is through an authenticated but unauthorized user who can manipulate spaces, rather than a remote attacker exploiting a public endpoint.
OpenCVE Enrichment