Impact
The vulnerability allows an attacker to trigger cite expansion before the system completes channel and direct message authorization checks. By exploiting this timing issue, a malicious user can cause content to be processed with elevated privileges, potentially allowing the insertion or manipulation of data that should not yet be authorized. The weakness is classified as CWE‑696, which involves premature authorization.
Affected Systems
The affected product is OpenClaw, specifically all releases older than version 2026.3.22. The vulnerability exists in the node.js based implementation and can be exploited by users who have access to channel or direct message interactions within the application.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers most likely rely on remote interaction with the messaging service, sending crafted messages or cites that trigger expansion before the final authorization decision. The exact attack vector is inferred from the description, as the official data does not specify the method of exploitation.
OpenCVE Enrichment
Github GHSA