Impact
OpenClaw before 2026.4.20 includes a message classification flaw in its Feishu card-action callbacks that mistakenly treats direct messages as group conversations. As a result, attackers can provoke card-action flows within private chats that should normally be blocked by dmPolicy restrictions. This flaw allows policy enforcement to be bypassed for direct message contexts, potentially enabling unauthorized card actions. The vulnerability exploits incorrect classification logic, identified as CWE-184.
Affected Systems
The affected product is OpenClaw, all releases older than version 2026.4.20. The vulnerability affects the Node.js runtime component used by the application. Users running any version before the 2026.4.20 release are at risk.
Risk and Exploitability
The CVSS score of 2.3 indicates a low severity overall. EPSS data is not available, so the likelihood of exploitation is uncertain, but the issue is not in the CISA KEV catalog. The probable attack vector is an attacker sending a crafted Feishu card-action request in a direct message, requiring the ability to initiate a card-action flow in a private conversation. No additional preconditions are listed beyond interacting with the Feishu integration. The risk remains limited but any bypass of dmPolicy enforcement can undermine policy controls.
OpenCVE Enrichment