#VU125080 Incorrect authorization in OpenClaw
Published: April 7, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to bypass group sender authorization checks and influence group sender authorization.
The vulnerability exists due to incorrect authorization in group allowlist composition when handling LINE group allowlist checks in configurations where DM pairing is enabled. A remote user can use a sender ID approved through DM pairing to bypass group allowlist restrictions and influence group sender authorization.
Under the default DM pairing policy, DM-paired sender IDs could satisfy group allowlist checks in specific LINE configurations.