CVE-2026-32027

MEDIUM

OpenClaw < 2026.2.26 - Improper Authorization via DM Pairing Store Identity Inheritance in Group Allowlist

Title source: cna
STIX 2.1

Description

OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerability where DM pairing-store identities are incorrectly eligible for group allowlist authorization checks. Attackers can exploit this cross-context authorization flaw by using a sender approved via DM pairing to satisfy group sender allowlist checks without explicit presence in groupAllowFrom, bypassing group message access controls.

References (4)

Core 4
Core References
Third Party Advisory third-party-advisory
GitHub Security Advisory (GHSA-jv6r-27ww-4gw4)
https://github.com/openclaw/openclaw/security/advisories/GHSA-jv6r-27ww-4gw4
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.2.26 - Improper Authorization via DM Pairing Store Identity Inheritance in Group Allowlist
https://www.vulncheck.com/advisories/openclaw-improper-authorization-via-dm-pairing-store-identity-inheritance-in-group-allowlist

Scores

CVSS v3 6.5
EPSS 0.0004
EPSS Percentile 11.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-863
Status published
Products (4)
npm/openclaw 0 - 2026.2.26npm
OpenClaw/OpenClaw < 2026.2.26
openclaw/openclaw < 2026.2.26
OpenClaw/OpenClaw 2026.2.26
Published Mar 19, 2026
Tracked Since Mar 20, 2026