2026.3.13
2 months ago
29 days ago
Known vulnerabilities in the @openclaw/zalo package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
@openclaw/zalo is an OpenClaw Zalo channel plugin Affected versions of this package are vulnerable to Expected Behavior Violation due to insufficient scoping of replay deduplication keys in webhook event processing. An attacker can cause legitimate messages from different conversations or senders to be suppressed by triggering cross-conversation or cross-sender collisions. How to fix Expected Behavior Violation? A fix was pushed into the | * |
@openclaw/zalo is an OpenClaw Zalo channel plugin Affected versions of this package are vulnerable to Replay Attack in the replay deduplication process. An attacker can bypass intended access restrictions by reusing How to fix Replay Attack? A fix was pushed into the | >=0.0.0 |
@openclaw/zalo is an OpenClaw Zalo channel plugin Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? A fix was pushed into the | >=0.0.0 |
@openclaw/zalo is an OpenClaw Zalo channel plugin Affected versions of this package are vulnerable to Brute Force via the Note: CVE-2026-34508 is a duplicate of this vulnerability. How to fix Brute Force? Upgrade | <2026.3.12 |