Impact
The vulnerability allows an attacker to retrieve Microsoft Teams thread messages via the Graph API that should be blocked by sender allowlists, thereby bypassing the application’s intended message filtering controls. By exploiting this flaw, an attacker can access content that was meant to be denied, potentially exposing sensitive information that the allowlist was designed to protect.
Affected Systems
The flaw exists in the OpenClaw application before version 2026.3.31. Users running any version earlier than 2026.3.31 are affected, regardless of the operating system, as the product runs in Node.js environments.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity level, and the vulnerability is not listed in the CISA KEV catalog, suggesting no known widespread exploitation as of now. Because the attack requires access to the Graph API for a Teams thread, it is likely a remote scenario that depends on the attacker having sufficient Graph API permissions or a compromised account. With the EPSS score of < 1%, the probability of exploitation remains uncertain, but the potential impact of bypassing sender allowlists warrants prompt remediation.
OpenCVE Enrichment