CVE-2026-22170
Received Received - Intake
Access Control Bypass in OpenClaw BlueBubbles Plugin Enables Unauthorized Messaging

Publication date: 2026-03-18

Last updated on: 2026-03-25

Assigner: VulnCheck

Description
OpenClaw versions prior to 2026.2.22 with the optional BlueBubbles plugin contain an access control bypass vulnerability where empty allowFrom configuration causes dmPolicy pairing and allowlist restrictions to be ineffective. Remote attackers can send direct messages to BlueBubbles accounts by exploiting the misconfigured allowlist validation logic to bypass intended sender authorization checks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-18
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.2.22 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-22170 is an access control bypass vulnerability in OpenClaw versions prior to 2026.2.22 when used with the optional BlueBubbles plugin. The issue arises when the allowFrom configuration is empty or unset, causing the dmPolicy pairing and allowlist restrictions to be ineffective.

Specifically, the authorization check for direct messages relies on functions that incorrectly allow messages from unauthorized senders if the allowlist is empty. This means remote attackers can send direct messages to BlueBubbles accounts without proper authorization.

The vulnerability is classified as CWE-863 (Incorrect Authorization) and was fixed by changing the allowlist validation logic to fail closed on empty allowlists, restoring the intended access control.


How can this vulnerability impact me? :

This vulnerability allows remote attackers to bypass sender authorization checks and send direct messages to BlueBubbles accounts without permission.

The impact depends on the deployment context: it is medium severity because BlueBubbles is an optional plugin and many deployments use private, owner-controlled identities with limited external reachability.

However, if the BlueBubbles identifier is publicly reachable or if agent tool permissions are broad, the risk and potential impact increase, potentially allowing unauthorized communication or interaction.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking if the OpenClaw BlueBubbles plugin is running a version prior to 2026.2.22 and if the allowFrom configuration is empty or unset, which causes the access control bypass.

Since the vulnerability allows unauthorized direct messages to be sent by bypassing sender authorization checks, monitoring logs for unexpected or unauthorized direct messages to BlueBubbles accounts can help detect exploitation attempts.

Specifically, you can look for verbose logs related to blocked messages, pairing requests, or errors during pairing reply sending, as the patched versions added detailed logging for these events.

Commands to detect the vulnerability might include:

  • Check the installed OpenClaw BlueBubbles plugin version: e.g., `npm list openclaw` or check the version in your deployment.
  • Inspect the BlueBubbles configuration file or settings for the allowFrom parameter to verify if it is empty or unset.
  • Review application logs for unexpected direct messages or pairing requests that indicate unauthorized access attempts.
  • Use network monitoring tools to detect unusual direct message traffic to BlueBubbles accounts from unknown senders.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade the OpenClaw BlueBubbles plugin to version 2026.2.22 or later, where the vulnerability has been fixed by enforcing a fail-closed behavior on empty allowlists and refactoring the access control logic.

If immediate upgrade is not possible, ensure that the allowFrom configuration is not empty or unset to prevent the bypass of sender authorization checks.

Additionally, review and tighten network and application access controls to limit exposure of BlueBubbles identifiers, especially if they are publicly reachable.

Monitor logs for suspicious direct message activity and pairing requests to detect potential exploitation attempts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart