Description
OpenClaw before 2026.3.22 performs cite expansion before completing channel and DM authorization checks, allowing cite work and content handling prior to final auth decisions. Attackers can exploit this timing vulnerability to access or manipulate content before proper authorization validation occurs.
Published: 2026-04-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized content handling via premature cite expansion
Action: Patch
AI Analysis

Impact

The vulnerability allows an attacker to trigger cite expansion before the system completes channel and direct message authorization checks. By exploiting this timing issue, a malicious user can cause content to be processed with elevated privileges, potentially allowing the insertion or manipulation of data that should not yet be authorized. The weakness is classified as CWE‑696, which involves premature authorization.

Affected Systems

The affected product is OpenClaw, specifically all releases older than version 2026.3.22. The vulnerability exists in the node.js based implementation and can be exploited by users who have access to channel or direct message interactions within the application.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers most likely rely on remote interaction with the messaging service, sending crafted messages or cites that trigger expansion before the final authorization decision. The exact attack vector is inferred from the description, as the official data does not specify the method of exploitation.

Generated by OpenCVE AI on April 9, 2026 at 22:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.3.22 or later.
  • Verify that the deployment is running the patched version and that cite expansion logic no longer occurs before authorization.
  • If an upgrade is delayed, monitor channel and DM traffic for abnormal cite activity and apply temporary access controls to prevent unauthorized content handling.

Generated by OpenCVE AI on April 9, 2026 at 22:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vfg3-pqpq-93m4 OpenClaw: Tlon cite expansion happens before channel and DM authorization is complete
History

Fri, 10 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.22 performs cite expansion before completing channel and DM authorization checks, allowing cite work and content handling prior to final auth decisions. Attackers can exploit this timing vulnerability to access or manipulate content before proper authorization validation occurs.
Title OpenClaw < 2026.3.22 - Premature Cite Expansion Before Authorization in Channel and DM
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-696
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-10T17:13:18.224Z

Reserved: 2026-04-04T12:30:33.463Z

Link: CVE-2026-35637

cve-icon Vulnrichment

Updated: 2026-04-10T17:13:14.233Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T22:16:32.933

Modified: 2026-04-15T16:53:40.590

Link: CVE-2026-35637

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:28:25Z

Weaknesses