Impact
OpenClaw prior to version 2026.3.22 fails to properly verify authentication for the Google Chat app‑url webhook. The flaw allows attackers to supply add‑on principals that are not bound to the intended deployment, effectively bypassing the webhook’s authentication checks. As a result, an attacker can trigger unauthorized actions through the Google Chat integration, such as sending deceptive messages or manipulating the add‑on’s state.
Affected Systems
The vulnerability affects the OpenClaw product from OpenClaw. All deployments using OpenClaw versions earlier than 2026.3.22 are susceptible. The issue is tied to the Node.js runtime as indicated in the product’s CPE model, but the vulnerability itself resides in the OpenClaw application logic.
Risk and Exploitability
The CVSS score is 6, indicating a moderate severity. No EPSS score is available and the vulnerability is not listed in CISA’s KEV catalog, suggesting limited exploitation evidence to date. The likely attack vector involves sending crafted webhook requests to the Google Chat integration endpoint; successful exploitation results in unauthorized execution of add‑on actions, leading to potential confidentiality or integrity breaches of the chat environment. While no public exploits are known, the moderate score and the ease of triggering the webhook make it a significant risk for users who rely on Google Chat add‑ons.
OpenCVE Enrichment