CVE-2026-35670
Received Received - Intake
Webhook Reply Rebinding Vulnerability in OpenClaw Enables User Impersonation

Publication date: 2026-04-10

Last updated on: 2026-04-13

Assigner: VulnCheck

Description
OpenClaw before 2026.3.22 contains a webhook reply delivery vulnerability that allows attackers to rebind chat replies to unintended users by exploiting mutable username matching instead of stable numeric user identifiers. Attackers can manipulate username changes to redirect webhook-triggered replies to different users, bypassing the intended recipient binding recorded in webhook events.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-10
Last Modified
2026-04-13
Generated
2026-05-07
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.22 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-807 The product uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to rebind chat replies to unintended users by exploiting mutable username matching instead of stable numeric user identifiers. This could lead to unauthorized access or misdelivery of messages, potentially exposing sensitive information.

Such unauthorized message redirection and potential data exposure could negatively impact compliance with data protection standards and regulations like GDPR and HIPAA, which require strict controls on personal data confidentiality and access.

The fix enforces reply delivery binding to stable numeric user IDs by default, reducing the risk of unauthorized access and helping maintain compliance with these regulations. Additionally, the legacy username-based matching is disabled by default and requires explicit opt-in with security warnings, further mitigating compliance risks.


Can you explain this vulnerability to me?

This vulnerability exists in OpenClaw versions before 2026.3.22 and involves the way webhook reply deliveries are handled. Specifically, attackers can exploit the system's use of mutable username matching instead of stable numeric user identifiers to rebind chat replies to unintended users. By manipulating username changes, attackers can redirect webhook-triggered replies away from the intended recipients, bypassing the original binding recorded in webhook events.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized redirection of chat replies, meaning that sensitive or private information intended for a specific user could be delivered to a different, unintended user. This can result in information disclosure and potential misuse of data, undermining the confidentiality and integrity of communications within the affected system.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking the configuration of the Synology Chat integration within the OpenClaw platform to see if the legacy username-based reply matching is enabled.

Specifically, you should verify whether the configuration flag `dangerouslyAllowNameMatching` is set to true, as this flag enables the vulnerable legacy behavior.

Since the vulnerability is related to webhook reply delivery relying on mutable usernames instead of stable numeric user IDs, monitoring webhook events and logs for unexpected reply redirections or mismatches between intended and actual recipients could also help detect exploitation attempts.

There are no explicit commands provided in the available resources, but you can inspect your OpenClaw Synology Chat channel configuration files or settings for the presence and value of `dangerouslyAllowNameMatching`.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately upgrade your OpenClaw installation to version 2026.3.22 or later, where the issue has been fixed.

Ensure that the configuration flag `dangerouslyAllowNameMatching` is disabled (set to false) globally and per account, as enabling this flag re-enables the vulnerable legacy username-based reply matching.

Maintain the default direct message policy of "allowlist" to restrict message senders to a configured list, enhancing security.

Avoid enabling the `dangerouslyAllowNameMatching` flag unless absolutely necessary for legacy compatibility, and if enabled, be aware of the associated security warnings and risks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart