CVE-2026-33576
Received Received - Intake
Unauthorized Media Download Vulnerability in OpenClaw Zalo Integration

Publication date: 2026-03-31

Last updated on: 2026-04-01

Assigner: VulnCheck

Description
OpenClaw before 2026.3.28 downloads and stores inbound media from Zalo channels before validating sender authorization. Unauthorized senders can force network fetches and disk writes to the media store by sending messages that are subsequently rejected.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-03-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.28 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not explicitly address how CVE-2026-33576 affects compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

CVE-2026-33576 is a vulnerability in OpenClaw versions before 2026.3.28 that affects the handling of inbound media from Zalo channels. The issue occurs because OpenClaw downloads and stores media files from messages before verifying whether the sender is authorized. This means unauthorized users can send messages that trigger network fetches and cause media files to be written to disk, even if their messages are later rejected.

The vulnerability arises from a missing authorization check prior to media download in direct messages (DMs). The fix introduced an authorization step that confirms sender permissions before any media is fetched or stored, preventing unauthorized media downloads.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized senders to cause your system to perform unwanted network fetches and write media files to disk. This can lead to resource misuse such as unnecessary bandwidth consumption and disk space usage.

Because the unauthorized media downloads happen without proper validation, it could also potentially expose your system to further security risks related to handling untrusted media content.

The vulnerability requires no privileges, user interaction, or authentication to exploit, making it easier for attackers to misuse the system.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthorized media downloads triggered by inbound Zalo messages before authorization checks. Detection would involve monitoring network traffic for unexpected media fetches from Zalo channels and checking disk writes related to media storage.

Since the vulnerability allows unauthorized senders to force network fetches and disk writes, you can look for unusual outbound network requests or unexpected media files being saved on disk originating from the OpenClaw application.

Specific commands are not provided in the available resources, but general approaches include:

  • Using network monitoring tools (e.g., tcpdump, Wireshark) to capture and analyze outbound HTTP/HTTPS requests from the OpenClaw process to detect unauthorized media fetches.
  • Checking file system activity (e.g., using auditd on Linux or Process Monitor on Windows) to identify unexpected media files being written by OpenClaw.
  • Reviewing OpenClaw logs for any indication of media downloads or message processing that occurs without proper authorization.

For more precise detection, you may need to implement custom logging or monitoring around the image handling functions in OpenClaw, especially before the fix in version 2026.3.28.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade OpenClaw to version 2026.3.28 or later, where the vulnerability is fixed by enforcing authorization checks before downloading and storing media from Zalo channels.

This update introduces an authorization function that prevents unauthorized users from triggering media downloads in direct messages, effectively blocking the exploit.

If immediate upgrade is not possible, consider restricting network access for the OpenClaw application to prevent unauthorized media fetches or disabling the Zalo extension temporarily.

Additionally, review and enforce DM policies such as pairing and allowed user lists to limit who can send messages that trigger media downloads.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart