Skip to content

Instantly share code, notes, and snippets.

@alon710
Created March 14, 2026 10:40
Show Gist options
  • Select an option

  • Save alon710/984a9edb1770e99283ebf3388943b70f to your computer and use it in GitHub Desktop.

Select an option

Save alon710/984a9edb1770e99283ebf3388943b70f to your computer and use it in GitHub Desktop.
GHSA-M69H-JM2F-2PV8: GHSA-m69h-jm2f-2pv8: Authorization Bypass via Insecure Event Resolution in OpenClaw Feishu Extension - CVE Security Report

GHSA-M69H-JM2F-2PV8: GHSA-m69h-jm2f-2pv8: Authorization Bypass via Insecure Event Resolution in OpenClaw Feishu Extension

CVSS Score: Moderate Published: 2026-03-13 Full Report: https://cvereports.com/reports/GHSA-M69H-JM2F-2PV8

Summary

An authorization bypass vulnerability exists in the Feishu extension of the OpenClaw AI assistant framework. By exploiting an insecure default in the reaction event processing logic, attackers can trigger bot actions in restricted group contexts, bypassing mention gating and group authorization controls.

TL;DR

OpenClaw versions prior to 2026.3.12 contain a logic flaw in the Feishu extension where ambiguous chat types default to 'p2p' (peer-to-peer). This allows attackers to bypass group Access Control Lists (ACLs) and mention requirements by reacting to messages with manipulated webhook payloads.

Technical Details

  • Attack Vector: Network
  • Impact: Authorization Bypass
  • Vulnerable Component: Feishu Extension (resolveReactionSyntheticEvent)
  • Fixed Version: 2026.3.12
  • Exploit Status: Unproven / Theoretical
  • CWE ID: CWE-863 (Incorrect Authorization)

Affected Systems

  • OpenClaw AI assistant framework
  • OpenClaw Feishu (Lark) Extension
  • openclaw: < 2026.3.12 (Fixed in: 2026.3.12)

Mitigation

  • Upgrade the openclaw package to the latest patched version.
  • Implement restrictive webhook filtering at the reverse proxy layer.
  • Disable reaction event subscriptions in the Feishu developer console as a temporary workaround.

Remediation Steps:

  1. Access the deployment environment where the OpenClaw application is hosted.
  2. Update the openclaw dependency in package.json to version >= 2026.3.12.
  3. Execute npm install or yarn install to pull the updated package.
  4. Restart the OpenClaw application service to apply the updated logic.
  5. Verify the bot correctly drops reaction events that lack valid chat type metadata.

References


Generated by CVEReports - Automated Vulnerability Intelligence

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment