Description
OpenClaw before 2026.4.20 contains a message classification vulnerability in Feishu card-action callbacks that misclassifies direct messages as group conversations. Attackers can bypass dmPolicy enforcement by triggering card-action flows in direct message conversations that should have been blocked by restrictive policies.
Problem types
Incomplete List of Disallowed Inputs
Product status
Any version before 2026.4.20
2026.4.20 (semver)
Credits
zsx (@zsxsoft)
KeenSecurityLab
qclawer
References
github.com/...enclaw/security/advisories/GHSA-72q8-jcmc-97wx (GitHub Security Advisory (GHSA-72q8-jcmc-97wx))
github.com/...ommit/90979d7c3ef7ec30b9f8aa6963a5e38d2f17d166 (Patch Commit)
www.vulncheck.com/...isclassification-in-feishu-card-actions (VulnCheck Advisory: OpenClaw < 2026.4.20 - Direct Message Misclassification in Feishu Card Actions)