Impact
OpenClaw implementations from version 2026.2.14 through 2026.3.24 do not consistently enforce guild and channel policy gates on Discord button and component interactions. As a result, attackers can trigger privileged actions from contexts that should be blocked, effectively bypassing intended access controls. The weakness corresponds to CWE‑863, an imprecise comparison that permits unauthorized access.
Affected Systems
The affected product is OpenClaw, specifically the OpenClaw application in the 2026.2.14 to 2026.3.24 release range. No other vendors or product lines are listed.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate potential impact; the EPSS score is not available and the vulnerability is not in the CISA KEV catalog. The attack vector is inferred to be remote via Discord component interactions, as the flaw involves bypassing channel policy enforcement through those interfaces. Once the policy gates are bypassed, an attacker can perform privileged component actions normally prohibited in the given context.
OpenCVE Enrichment