Impact
OpenClaw versions prior to 2026.4.8 lack owner-only enforcement for cross‑channel allowlist writes, allowing an authenticated user who does not own a channel to modify that channel’s allowlist. This violation of the intended trust model permits unauthorized addition of users or applications to other channels’ allowlist, potentially granting them message sending capabilities that they should not have.
Affected Systems
All OpenClaw releases before 2026.4.8, including 2026.4.7 and earlier, are affected. Any deployment that relies on cross‑channel allowlist updates without additional authorization checks is vulnerable.
Risk and Exploitability
The CVSS score of 2.3 indicates low severity, and the vulnerability is not listed in CISA KEV. Because the EPSS score is unavailable, the likelihood of exploitation is unclear, but the required access is an authenticated identity that is not an owner of the target channel. An attacker who can authenticate to the system can exploit the endpoint to modify another channel’s allowlist, bypassing the intended ownership restriction.
OpenCVE Enrichment