Description
OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against sender display names and localparts without homeserver validation. Remote Matrix users can impersonate allowed identities by using attacker-controlled display names or matching localparts from different homeservers to reach the routing and agent pipeline.
Problem types
Product status
2026.1.14-1 (custom) before 2026.2.2
Credits
@MegaManSec (https://joshua.hu) of AISLE Research Team
References
github.com/...enclaw/security/advisories/GHSA-rmxw-jxxx-4cpc (GitHub Security Advisory (GHSA-rmxw-jxxx-4cpc))
github.com/...ommit/8f3bfbd1c4fb967a2ddb5b4b9a05784920814bcf (Patch Commit)
www.vulncheck.com/...homeserver-localpart-matching-in-matrix (VulnCheck Advisory: OpenClaw 2026.1.14-1 < 2026.2.2 - Allowlist Bypass via displayName and Cross-Homeserver localpart Matching in Matrix Plugin)