Description
OpenClaw before 2026.4.2 fails to filter Slack thread context by sender allowlist, allowing non-allowlisted messages to enter agent context. Attackers can inject unauthorized thread messages through allowlisted user replies to bypass sender access controls and manipulate model context.
Problem types
CWE-346: Origin Validation Error
Product status
Any version before 2026.4.2
2026.4.2 (semver)
Credits
AntAISecurityLab
References
github.com/...enclaw/security/advisories/GHSA-qm77-8qjp-4vcm (GitHub Security Advisory (GHSA-qm77-8qjp-4vcm))
github.com/...ommit/ac5bc4fb37becc64a2ec314864cca1565e921f2d (Patch Commit)
www.vulncheck.com/...lowlist-bypass-via-slack-thread-context (VulnCheck Advisory: OpenClaw < 2026.4.2 - Sender Allowlist Bypass via Slack Thread Context)