#VU125080 Incorrect authorization in OpenClaw

 

#VU125080 Incorrect authorization in OpenClaw

Published: April 7, 2026


Vulnerability identifier: #VU125080
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-863
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
OpenClaw
Software vendor:
OpenClaw

Description

The vulnerability allows a remote user to bypass group sender authorization checks and influence group sender authorization.

The vulnerability exists due to incorrect authorization in group allowlist composition when handling LINE group allowlist checks in configurations where DM pairing is enabled. A remote user can use a sender ID approved through DM pairing to bypass group allowlist restrictions and influence group sender authorization.

Under the default DM pairing policy, DM-paired sender IDs could satisfy group allowlist checks in specific LINE configurations.


Remediation

Install security update from vendor's website.

External links