Description
OpenClaw before 2026.3.31 contains a sender allowlist bypass vulnerability that allows remote attackers to access restricted messages. Attackers can exploit fetched quoted, root, and thread context messages to bypass sender allowlist restrictions and retrieve unauthorized content.
Problem types
CWE-639 Authorization Bypass Through User-Controlled Key
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
AntAISecurityLab
References
github.com/...enclaw/security/advisories/GHSA-877v-w3f5-3pcq (GitHub Security Advisory (GHSA-877v-w3f5-3pcq))
github.com/...ommit/f45e5a6569aab1d58cc6de25b19f1dc4c8779b85 (Patch Commit)
www.vulncheck.com/...-via-thread-history-and-quoted-messages (VulnCheck Advisory: OpenClaw < 2026.3.31 - Sender Allowlist Bypass via Thread History and Quoted Messages)