OpenClaw before 2026.3.12 contains a weak authorization vulnerability in Zalouser allowlist mode that matches mutable group display names instead of stable group identifiers. Attackers can create groups with identical names to allowlisted groups to bypass channel authorization and route messages from unintended groups to the agent.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/security/advisories/GHSA-f5mf-3r52-r83w | Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-weak-authorization-via-mutable-group-names-in-zalouser-allowlist | Third Party Advisory |
Configurations
History
30 Mar 2026, 17:13
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw
Openclaw openclaw |
|
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-f5mf-3r52-r83w - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-weak-authorization-via-mutable-group-names-in-zalouser-allowlist - Third Party Advisory |
Information
Published : 2026-03-29 13:17
Updated : 2026-03-30 17:13
NVD link : CVE-2026-32975
Mitre link : CVE-2026-32975
CVE.ORG link : CVE-2026-32975
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-807
Reliance on Untrusted Inputs in a Security Decision
