Description
OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerability in the Slack slash-command handler that incorrectly authorizes any direct message sender when dmPolicy is set to open (must be configured). Attackers can execute privileged slash commands via direct message to bypass allowlist and access-group restrictions.
Problem types
Incorrect Authorization
Product status
Any version before 2026.2.14
Credits
Christos (@christos-eth)
References
github.com/...enclaw/security/advisories/GHSA-v773-r54f-q32w (GitHub Security Advisory (GHSA-v773-r54f-q32w))
github.com/...ommit/f19eabee54c49e9a2e264b4965edf28a2f92e657 (Patch Commit)
www.vulncheck.com/...ash-command-handler-via-direct-messages (VulnCheck Advisory: OpenClaw < 2026.2.14 - Privilege Escalation in Slack Slash Command Handler via Direct Messages)