Impact
OpenClaw before 2026.3.31 contains an allowlist bypass in its Matrix thread root and reply context handling. The flaw allows attackers to retrieve thread-root and reply context messages that should be restricted by sender allowlists, enabling unauthorized reading of confidential message content. This weakness corresponds to CWE-346, which addresses failure to restrict or lock down access to secured resources.
Affected Systems
The vulnerability affects the OpenClaw product from the OpenClaw vendor. Version numbers lower than 2026.3.31 are affected; all releases 2026.3.31 and newer contain the applied fix.
Risk and Exploitability
The CVSS score is 2.3, reflecting a low severity impact. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no publicly known exploitation. The likely attack path requires an attacker to send a crafted matrix message that bypasses the sender allowlist, implying an application‑level exploitation without privilege escalation. Because of the modest severity and lack of widespread exploitation, the immediate risk to an environment is low but the flaw can still be leveraged to read restricted data if not mitigated.
OpenCVE Enrichment