CVE-2026-32924
Received Received - Intake
Authorization Bypass in OpenClaw Group Chat Reaction Events

Publication date: 2026-03-29

Last updated on: 2026-03-31

Assigner: VulnCheck

Description
OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where Feishu reaction events with omitted chat_type are misclassified as p2p conversations instead of group chats. Attackers can exploit this misclassification to bypass groupAllowFrom and requireMention protections in group chat reaction-derived events.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-29
Last Modified
2026-03-31
Generated
2026-05-07
AI Q&A
2026-03-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.12 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-32924 is an authorization bypass vulnerability in OpenClaw versions before 2026.3.12. It occurs because Feishu reaction events that omit the chat_type attribute are incorrectly classified as peer-to-peer (p2p) conversations instead of group chats.

This misclassification allows attackers to bypass security protections such as groupAllowFrom and requireMention, which are designed to restrict actions within group chat reaction-derived events.


How can this vulnerability impact me? :

This vulnerability can allow attackers to bypass group chat security controls, potentially enabling unauthorized actions or access within group conversations.

Because the system treats certain group chat reactions as direct messages, protections that limit who can interact or mention others in group chats are circumvented, increasing the risk of unauthorized information disclosure or manipulation.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability can be mitigated by updating OpenClaw to version 2026.3.12 or later.

This update ensures that reaction events correctly preserve the group context before authorization and mention-gate evaluation, preventing the bypass of groupAllowFrom and requireMention protections.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in OpenClaw allows attackers to bypass group authorization and mention gating protections by misclassifying group chat reaction events as peer-to-peer conversations. This improper authorization can lead to unauthorized access or actions within group chats.

Such authorization bypass issues can potentially impact compliance with standards and regulations like GDPR and HIPAA, which require strict access controls and protection of sensitive information. If unauthorized users can bypass protections and access or manipulate group chat data, it may result in violations of data privacy and security requirements mandated by these regulations.

Therefore, until the vulnerability is mitigated by updating OpenClaw to version 2026.3.12 or later, organizations using affected versions may face increased risk of non-compliance with these common standards due to weakened authorization controls.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability arises from Feishu reaction events where the chat_type attribute is omitted, causing misclassification of group chats as peer-to-peer conversations. Detection involves monitoring Feishu reaction events for missing or omitted chat_type fields in the payload.

To detect this on your system or network, you should inspect inbound Feishu reaction event payloads for the absence of the chat_type field or for chat_type values that do not correctly indicate group chats.

While no specific commands are provided in the available resources, a general approach would be to capture and analyze network traffic or application logs where Feishu reaction events are processed. For example, using tools like tcpdump or Wireshark to filter and inspect traffic related to Feishu reaction events, or querying application logs for reaction events missing the chat_type attribute.

  • Use network packet capture tools (e.g., tcpdump) to capture Feishu reaction event traffic.
  • Filter captured data for reaction events and check for missing or empty chat_type fields.
  • Review application logs for reaction events lacking the chat_type attribute.
  • Implement custom scripts or queries to detect reaction events where chat_type is omitted or misclassified.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart