Description
OpenClaw before 2026.3.25 contains an authentication bypass vulnerability in raw card send surface that allows unpaired recipients to mint legacy callback payloads. Attackers can send raw card commands to bypass DM pairing restrictions and reach callback handling without proper authorization.
Published: 2026-04-10
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Apply Patch
AI Analysis

Impact

The vulnerability is an authentication bypass in the raw card send interface of OpenClaw versions prior to 2026.3.25. Attackers can send specially crafted raw card commands that bypass the device‑manager pairing checks and trigger legacy callback payloads for unpaired recipients. This bypass can grant an attacker unauthorized execution of callbacks, potentially exposing sensitive data or enabling further compromise of the host system. The weakness is identified as CWE‑288, reflecting the failure to properly authenticate requests before execution.

Affected Systems

OpenClaw devices running firmware less than 2026.3.25 are affected. All deployments of the OpenClaw product line that use the raw card send surface without the updated pairing enforcement are vulnerable. This includes any installations of the OpenClaw node.js-based platform that have not applied the 2026.3.25 update. The CPE string cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* matches these affected releases.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate to high severity, and while EPSS data is not available, the lack of a KEV listing suggests no widespread exploitation has been observed yet. The likely attack vector is remote, via transmission of raw card commands over the network interface that OpenClaw exposes. An attacker would need to know the correct card command format and have network access to the target device. Once the bypass is achieved, the attacker can invoke callback routines without authorization, leading to potential information disclosure or unauthorized system actions. This makes the vulnerability significant for organizations that rely on strict DM pairing controls.

Generated by OpenCVE AI on April 10, 2026 at 17:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.3.25 or newer
  • Verify that DM pairing restrictions are enforced after the update
  • Disable or remove legacy callback functionality if it is not required
  • Restrict network access to the OpenClaw raw card send interface to trusted hosts
  • Monitor application logs for unexpected legacy callback executions

Generated by OpenCVE AI on April 10, 2026 at 17:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-77w2-crqv-cmv3 OpenClaw: Feishu Raw Card Send Surface Can Mint Legacy Card Callbacks That Bypass DM Pairing
History

Tue, 14 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.25 contains an authentication bypass vulnerability in raw card send surface that allows unpaired recipients to mint legacy callback payloads. Attackers can send raw card commands to bypass DM pairing restrictions and reach callback handling without proper authorization.
Title OpenClaw < 2026.3.25 - DM Pairing Bypass via Legacy Card Callbacks
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-288
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-14T14:57:59.515Z

Reserved: 2026-04-04T12:31:57.498Z

Link: CVE-2026-35664

cve-icon Vulnrichment

Updated: 2026-04-14T14:57:55.465Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T17:17:08.240

Modified: 2026-04-13T20:39:15.373

Link: CVE-2026-35664

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T13:00:39Z

Weaknesses