Description
OpenClaw before 2026.3.31 contains a sender allowlist bypass vulnerability in MS Teams thread history fetched via Graph API. Attackers can retrieve thread messages that should be filtered by sender allowlists, bypassing message filtering restrictions.
Problem types
CWE-441: Unintended Proxy or Intermediary ('Confused Deputy')
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
AntAISecurityLab
References
github.com/...enclaw/security/advisories/GHSA-chfm-xgc4-47rj (GitHub Security Advisory (GHSA-chfm-xgc4-47rj))
github.com/...ommit/5cca38084074fb5095aa11b6a59820d63e4937c9 (Patch Commit)
www.vulncheck.com/...ist-bypass-via-graph-api-thread-history (VulnCheck Advisory: OpenClaw < 2026.3.31 - Sender Allowlist Bypass via Graph API Thread History)