Description
OpenClaw before 2026.3.22 contains a policy confusion vulnerability in room authorization that matches colliding room names instead of stable room tokens. Attackers can exploit similarly named rooms to bypass allowlist policies and gain unauthorized access to protected Nextcloud Talk rooms.
Published: 2026-04-09
Score: 2.3 Low
EPSS: n/a
KEV: No
Impact: Unauthorized Access
Action: Apply Patch
AI Analysis

Impact

OpenClaw versions before 2026.3.22 contain a policy confusion vulnerability in the room authorization logic. The software mistakenly resolves room identifiers based on colliding room names rather than stable room tokens. An attacker can create a room with a name that matches an existing protected room, causing the system to apply the unauthorized user’s permissions and bypass the configured allowlist. This allows unauthenticated or low‑privileged users to gain access to confidential Nextcloud Talk rooms.

Affected Systems

The vulnerability affects the OpenClaw application across all environments that use the Node.js backend. Any deployment running a pre‑2026.3.22 release is impacted, as the issue is present in all prior versions. Administrators should verify the current patch level of OpenClaw in their environment and compare it to the 2026.3.22 release.

Risk and Exploitability

The CVSS score of 2.3 classifies the flaw as low severity, and no EPSS data or KEV listing is available. Based on the description, the likely attack vector involves remote submission of a room creation request, which is a typical HTTP API interaction. The exploitation requires knowledge of a protected room’s name and the ability to create a competing room. While the risk to individual deployments is low, the vulnerability can enable unauthorized access to sensitive communications. Monitoring for new advisories and applying the vendor patch remains the best mitigation.

Generated by OpenCVE AI on April 9, 2026 at 22:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the installed OpenClaw version against 2026.3.22 to determine if the system is impacted.
  • Upgrade OpenClaw to version 2026.3.22 or later to resolve the policy confusion flaw.
  • Validate that room authorization works correctly by attempting to create a room with a colliding name; no unauthorized access should be granted.

Generated by OpenCVE AI on April 9, 2026 at 22:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.22 contains a policy confusion vulnerability in room authorization that matches colliding room names instead of stable room tokens. Attackers can exploit similarly named rooms to bypass allowlist policies and gain unauthorized access to protected Nextcloud Talk rooms.
Title OpenClaw < 2026.3.22 - Policy Confusion via Room Name Collision in Nextcloud Talk
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-807
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-09T21:26:56.154Z

Reserved: 2026-04-04T12:28:49.756Z

Link: CVE-2026-35624

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T22:16:30.683

Modified: 2026-04-09T22:16:30.683

Link: CVE-2026-35624

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:28:38Z

Weaknesses