Home

Description

OpenClaw versions 2026.1.30 and earlier, contain an information disclosure vulnerability, patched in 2026.2.1, in the MS Teams attachment downloader (optional extension must be enabled) that leaks bearer tokens to allowlisted suffix domains. When retrying downloads after receiving 401 or 403 responses, the application sends Authorization bearer tokens to untrusted hosts matching the permissive suffix-based allowlist, enabling token theft.

PUBLISHED Reserved 2026-02-27 | Published 2026-03-05 | Updated 2026-03-06 | Assigner VulnCheck




MEDIUM: 5.9CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Problem types

Insertion of Sensitive Information Into Sent Data

Product status

Default status
unaffected

Any version
affected

Credits

Yue (Knox) Liu (@yueyueL) reporter

References

github.com/...enclaw/security/advisories/GHSA-7vwx-582j-j332 (GitHub Security Advisory (GHSA-7vwx-582j-j332)) vendor-advisory

github.com/...ommit/41cc5bcd4f1d434ad1bbdfa55b56f25025ecbf6b (Patch Commit) patch

www.vulncheck.com/...s-attachment-downloader-suffix-matching (VulnCheck Advisory: OpenClaw < 2026.2.1 - Bearer Token Leakage via MS Teams Attachment Downloader Suffix Matching) third-party-advisory

cve.org (CVE-2026-28481)

nvd.nist.gov (CVE-2026-28481)

Download JSON