CVE-2026-32021

MEDIUM

OpenClaw < 2026.2.22 - Authorization Bypass via Display Name Collision in Feishu allowFrom

Title source: cna
STIX 2.1

Description

OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in the Feishu allowFrom allowlist implementation that accepts mutable sender display names instead of enforcing ID-only matching. An attacker can set a display name equal to an allowlisted ID string to bypass authorization checks and gain unauthorized access.

Scores

CVSS v3 6.5
EPSS 0.0004
EPSS Percentile 11.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-863
Status published
Products (4)
npm/openclaw 0 - 2026.2.22npm
OpenClaw/OpenClaw < 2026.2.22
openclaw/openclaw < 2026.2.22
OpenClaw/OpenClaw 2026.2.22
Published Mar 19, 2026
Tracked Since Mar 20, 2026