2026.3.13
1 months ago
20 days ago
Known vulnerabilities in the @openclaw/feishu package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
@openclaw/feishu is an OpenClaw Feishu/Lark channel plugin (community maintained by @m1heng) Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? A fix was pushed into the | >=2026.2.6 |
@openclaw/feishu is an OpenClaw Feishu/Lark channel plugin (community maintained by @m1heng) Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through the How to fix Allocation of Resources Without Limits or Throttling? A fix was pushed into the | * |
@openclaw/feishu is an OpenClaw Feishu/Lark channel plugin (community maintained by @m1heng) Affected versions of this package are vulnerable to Incorrect Authorization via the callback handling process. An attacker can gain unauthorized access to callback functionality by sending specially crafted legacy raw card payloads that bypass recipient pairing checks. How to fix Incorrect Authorization? A fix was pushed into the | >=0.0.0 |
@openclaw/feishu is an OpenClaw Feishu/Lark channel plugin (community maintained by @m1heng) Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the Feishu webhook handling process. An attacker can cause excessive resource consumption by sending unauthenticated requests that are fully parsed before signature validation. How to fix Allocation of Resources Without Limits or Throttling? A fix was pushed into the | >=0.0.0 |
@openclaw/feishu is an OpenClaw Feishu/Lark channel plugin (community maintained by @m1heng) Affected versions of this package are vulnerable to Incorrect Authorization via the event authorization. An attacker can bypass group authorization and mention gating by crafting a synthetic reaction event with an omitted How to fix Incorrect Authorization? Upgrade | <2026.3.12 |
@openclaw/feishu is an OpenClaw Feishu/Lark channel plugin (community maintained by @m1heng) Affected versions of this package are vulnerable to Incorrect Authorization through improper access control in the pairing store process. An attacker can gain unauthorized access to another account's direct message pairing by leveraging approval from a different account in multi-account deployments. How to fix Incorrect Authorization? Upgrade | <2026.3.1 |
@openclaw/feishu is an OpenClaw Feishu/Lark channel plugin (community maintained by @m1heng) Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <2026.2.22 |