Impact
OpenClaw versions earlier than 2026.3.28 contain a flaw that allows an attacker to execute Discord text commands that bypass the channels.discord.execApprovals.approvers allowlist. The vulnerability permits non‑approvers to resolve pending execution approvals, enabling the launch of host commands without proper authorization. The weakness is a classic permission‑checking error (CWE‑863), potentially facilitating privilege escalation and unauthorized system access.
Affected Systems
The affected product is OpenClaw, as distributed before version 2026.3.28. The software is a Node.js application that interfaces with Discord for host‑execution approvals. All installations of OpenClaw running a version older than 2026.3.28 are susceptible.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity. No EPSS value is provided, but the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by sending a specially crafted Discord command in a channel that the OpenClaw bot monitors. The attacker only needs basic Discord access to a channel linked to the bot; no system local privileges or network credentials are required, making the attack plausible in most environments where OpenClaw is deployed.
OpenCVE Enrichment
Github GHSA