Description
OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Telegram callback query handling that allows attackers to mutate session state without satisfying normal DM pairing requirements. Remote attackers can exploit weaker callback-only authorization in direct messages to bypass DM pairing and modify session state.
Published: 2026-04-10
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized session state modification
Action: Apply patch
AI Analysis

Impact

OpenClaw before 2026.3.25 contains an authorization bypass flaw in the handling of Telegram callback queries. The flaw allows an attacker to modify the service’s session state by exploiting a weaker authorization check that is triggered when a callback is received within a direct message context. Because the callback query bypasses the normal direct‑message pairing requirement, an unauthorized user can inject or change session tokens and other stateful data. This flaw is classified as CWE‑288 – Authorization Bypass By Privilege Escalation, and it grants the attacker the ability to tamper with session integrity and potentially gain unauthorized control over the bot’s operations.

Affected Systems

The vulnerability affects installations of OpenClaw version 2026.3.24 and earlier. Systems running the open source OpenClaw software on Node.js that are used to process Telegram bot interactions are susceptible. Specifically, any deployment that processes Telegram callback queries—and that has not upgraded beyond the 2026.3.25 release— may be exploitable. The affected component is the callback query handler in the Telegram integration of OpenClaw.

Risk and Exploitability

The CVSS base score of 6.9 indicates a medium to high severity, reflecting the potential for significant data or control compromise in a production bot. The EPSS score is not available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, so no public exploit evidence is documented. The attack vector is remote, as the flaw is triggered by Telegram messages sent from an external user. An attacker only needs to send a specially crafted callback query over Telegram; no authentication is required beyond the existing messaging channel. Given the lack of mitigations from the service side, an exploit can succeed if the victim bot remains open to direct messages. Therefore, prompt remediation is advised.

Generated by OpenCVE AI on April 10, 2026 at 17:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check installed OpenClaw version. If the version is 2026.3.24 or earlier, plan an upgrade. Apply the latest OpenClaw release that includes the fix, such as 2026.3.25 or newer. Restart the OpenClaw service after updating. Verify the deployment is running the patched version.

Generated by OpenCVE AI on April 10, 2026 at 17:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-j4c9-w69r-cw33 OpenClaw: Telegram DM-Scoped Inline Button Callbacks Bypass DM Pairing and Mutate Session State
History

Fri, 10 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Telegram callback query handling that allows attackers to mutate session state without satisfying normal DM pairing requirements. Remote attackers can exploit weaker callback-only authorization in direct messages to bypass DM pairing and modify session state.
Title OpenClaw < 2026.3.25 - Telegram DM-Scoped Inline Button Callback Authorization Bypass
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-288
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-10T20:18:04.127Z

Reserved: 2026-04-04T12:31:57.498Z

Link: CVE-2026-35661

cve-icon Vulnrichment

Updated: 2026-04-10T20:15:02.806Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T17:17:07.687

Modified: 2026-04-13T20:32:13.767

Link: CVE-2026-35661

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T13:00:42Z

Weaknesses