Home

Description

OpenClaw versions prior to 2026.2.22 with the optional BlueBubbles plugin contain an access control bypass vulnerability where empty allowFrom configuration causes dmPolicy pairing and allowlist restrictions to be ineffective. Remote attackers can send direct messages to BlueBubbles accounts by exploiting the misconfigured allowlist validation logic to bypass intended sender authorization checks.

PUBLISHED Reserved 2026-01-06 | Published 2026-03-18 | Updated 2026-03-31 | Assigner VulnCheck




MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-863: Incorrect Authorization

Product status

Default status
unaffected

Any version before 2026.2.22
affected

Credits

tdjackey reporter

References

github.com/...enclaw/security/advisories/GHSA-jwf4-8wf4-jf2m (GitHub Security Advisory (GHSA-jwf4-8wf4-jf2m)) third-party-advisory

github.com/...ommit/9632b9bcf032c5f2280c3103961fde912ab1f920 (Patch Commit #1) patch

github.com/...ommit/2ba6de7eaad812e5e8603018e14e54e96bdd57dd (Patch Commit #2) patch

github.com/...ommit/51c0893673de8e5cea64e64351dbfa4680ba0dec (Patch Commit #3) patch

github.com/...ommit/4540790cb62412676f7b61cfc6e47443f84a251e (Patch Commit #4) patch

www.vulncheck.com/...ypass-via-empty-allowfrom-configuration (VulnCheck Advisory: OpenClaw < 2026.2.22 BlueBubbles - Access Control Bypass via Empty allowFrom Configuration) third-party-advisory

cve.org (CVE-2026-22170)

nvd.nist.gov (CVE-2026-22170)

Download JSON