Impact
An access control flaw allows an attacker to submit verification notices that bypass the application’s direct message (DM) policy checks, enabling the sending of messages to recipients who are not part of an approved direct‑message pairing. This flaw undermines the intended communication boundaries and can expose sensitive information to unintended parties.
Affected Systems
OpenClaw versions earlier than 2026.3.25 are affected. The vulnerability exists in the core OpenClaw application running on node.js. Users deploying any pre‑2026.3.25 release of OpenClaw should consider the impact.
Risk and Exploitability
The CVSS score of 6.9 indicates medium‑to‑high severity. No EPSS data is available, and the vulnerability is not listed in CISA’s KEV catalog. Attackers would exploit the flaw by sending crafted verification notices over the network to users whose relationships do not satisfy the enforced DM policy. Successful exploitation requires network access to the OpenClaw instance and the ability to construct a verification notice that is accepted by the service before policy validation.
OpenCVE Enrichment
Github GHSA