#VU125224 Improper access control in OpenClaw - CVE-2026-33578
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to bypass sender restrictions.
The vulnerability exists due to improper access control in extensions/googlechat/src/monitor-access.ts and extensions/zalouser/src/monitor.ts when resolving sender policy for routes configured with only a group allowlist. A remote user can interact with the bot from an allowlisted Google Chat space or Zalouser group to bypass sender restrictions.
The issue occurs when only a route-level group allowlist is configured and sender policy resolution downgrades from allowlist to open.