CVE-2026-35642
Authorization Bypass in OpenClaw Group Reaction Events Allows Privilege Escalation
Publication date: 2026-04-09
Last updated on: 2026-04-15
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.25 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-288 | The product requires authentication, but the product has an alternate path or channel that does not require authentication. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenClaw versions before 2026.3.25 and involves an authorization bypass. Specifically, group reaction events bypass the requireMention access control mechanism, allowing attackers to trigger reactions in mention-gated groups. This enables them to enqueue agent-visible system events that should normally be restricted.
How can this vulnerability impact me? :
The impact of this vulnerability is that attackers with limited privileges can bypass access controls to trigger system events that are supposed to be restricted. This could lead to unauthorized actions or visibility of system events, potentially undermining the security and integrity of the affected system.