Incorrect Authorization Affecting openclaw package, versions <2026.2.25


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-OPENCLAW-15423880
  • published5 Mar 2026
  • disclosed4 Mar 2026
  • creditUnknown

Introduced: 4 Mar 2026

New CVE NOT AVAILABLE CWE-863  (opens in a new tab)

How to fix?

Upgrade openclaw to version 2026.2.25 or higher.

Overview

openclaw is a 🦞 OpenClaw — Personal AI Assistant

Affected versions of this package are vulnerable to Incorrect Authorization in the processing of Slack interactive callbacks, specifically block_action, view_submission, and view_closed. An attacker can inject unauthorized system-event text into an active session by sending crafted interactive callback requests before full sender authorization checks are performed. This is only exploitable if the deployment is in a shared Slack workspace that relies on sender restrictions such as allowFrom, DM policy, or channel user allowlists.

References

CVSS Base Scores

version 4.0
version 3.1