Description
OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty groupAllowFrom parameter, the message handler synthesizes wildcard sender authorization, permitting any sender in the matched team/channel to trigger replies in allowlisted Teams routes.
Problem types
CWE-863: Incorrect Authorization
Product status
Any version before 2026.3.8
2026.3.8 (semver)
Credits
Peng Zhou (@zpbrent)
References
github.com/...enclaw/security/advisories/GHSA-g7cr-9h7q-4qxq (GitHub Security Advisory (GHSA-g7cr-9h7q-4qxq))
github.com/...ommit/88aee9161e0e6d32e810a25711e32a808a1777b2 (Patch Commit)
www.vulncheck.com/...lugin-via-route-allowlist-configuration (VulnCheck Advisory: OpenClaw < 2026.3.8 - Sender Allowlist Bypass in Microsoft Teams Plugin via Route Allowlist Configuration)