Impact
OpenClaw versions earlier than 2026.4.21 contain an authorization bypass flaw in command-auth.ts that allows non‑owner senders to invoke owner‑enforced slash commands. The vulnerability, identified by CWE‑863, enables attackers to execute privileged commands such as /send, /config, or /debug on channels that accept wildcard inbound senders without explicit owner allowFrom settings, effectively giving them unauthorized command control.
Affected Systems
The affected product is OpenClaw from OpenClaw. All releases before 2026.4.21 are impacted; any deployment running a version older than this patch is vulnerable.
Risk and Exploitability
The CVSS score of 2.3 indicates limited severity, and the EPSS score is not available; the vulnerability is not listed in the CISA KEV catalog. Attacks are expected to occur when a channel is configured to allow inbound wildcard senders, which is common in community or public servers. An attacker can exploit the flaw by sending one of the designated owner‑only commands within the affected channel to bypass normal authorization checks.
OpenCVE Enrichment