Impact
OpenClaw before 2026.3.31 contains a logic error in Discord component interaction routing that misclassifies group direct messages as direct messages. This misclassification can be abused by an attacker to bypass group DM policy enforcement or cause incorrect session handling. The flaw aligns with CWE-351, a logic error that leads to unintended behavior. Because it only affects policy enforcement and session state, no direct compromise of credentials or code execution is possible.
Affected Systems
Vendors: OpenClaw; Product: OpenClaw. Affected versions are all ones preceding 2026.3.31—with the fix introduced in the 2026.3.31 release. Users running legacy OpenClaw installations that include the Discord extension are potentially vulnerable.
Risk and Exploitability
The CVSS score is 2.3, indicating low severity, and the EPSS score is below 1%. The vulnerability is not listed in the CISA KEV catalog. The attack path is inferred to require an attacker who can send crafted Discord component interaction payloads to the OpenClaw Discord extension; such an attacker could trigger the misclassification. No additional conditions are noted. Overall risk remains modest, but the potential to circumvent group DM controls could undermine administrative policies.
OpenCVE Enrichment
Github GHSA