Impact
OpenClaw prior to version 2026.3.25 contains an authorization bypass flaw in the Microsoft Teams feedback invoke endpoints. The bypass removes the sender allowlist check, allowing any sender to submit feedback on behalf of any user. This unauthorized recording attack aligns with the authorization weakness class (CWE‑288) and permits attackers to capture or reflect session data that should otherwise be protected.
Affected Systems
The vulnerable component is the OpenClaw application, built on Node.js. Any deployment running a version earlier than 2026.3.25 is affected. No other vendors or product lines are listed as impacted.
Risk and Exploitability
The CVSS base score of 6.9 indicates a moderate risk level. No EPSS data is available, and there are no known public exploitation reports or listings in the CISA Known Exploited Vulnerabilities catalog. The attack likely requires only the ability to send crafted HTTP requests to the Teams feedback invoke endpoints, with no privileged access needed. Consequently, exposed systems face a moderate, but non‑trivial, risk, and prompt mitigation is recommended.
OpenCVE Enrichment
Github GHSA