Incorrect Authorization Affecting @openclaw/feishu package, versions >=0.0.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-OPENCLAWFEISHU-15812235
  • published29 Mar 2026
  • disclosed29 Mar 2026
  • creditzpbrent

Introduced: 29 Mar 2026

New CVE NOT AVAILABLE CWE-288  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

@openclaw/feishu is an OpenClaw Feishu/Lark channel plugin (community maintained by @m1heng)

Affected versions of this package are vulnerable to Incorrect Authorization via the callback handling process. An attacker can gain unauthorized access to callback functionality by sending specially crafted legacy raw card payloads that bypass recipient pairing checks.

CVSS Base Scores

version 4.0
version 3.1