Impact
OpenClaw versions earlier than 2026.4.15 contain an authorization bypass in Matrix room control‑command processing. The system trusts entries in the DM pairing‑store, allowing an attacker who owns a DM‑paired sender ID to submit control commands in bot rooms without being on an allowlist. This flaw can lead to the execution of privileged OpenClaw behavior such as altering room configuration or impostering handling logic, effectively compromising the integrity of the application.
Affected Systems
The vulnerability affects the OpenClaw application across all operating environments, specifically any instance of OpenClaw before the 2026.4.15 release. Users running older releases should verify their version and plan an update.
Risk and Exploitability
The CVSS score of 7.7 indicates a high impact potential. While an EPSS score is not publicly available, the flaw involves privileged command execution and is not listed in CISA’s KEV catalog, suggesting moderate public exposure. Attackers need only possess a DM‑paired sender ID and post within a bot room; the exploit can be carried out from an authenticated session or by exploiting the DM pairing store configuration. The CWE‑863 classification reflects an authority control weakness.
OpenCVE Enrichment