Expected Behavior Violation Affecting @openclaw/zalo package, versions *


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-OPENCLAWZALO-15928879
  • published8 Apr 2026
  • disclosed7 Apr 2026
  • creditSteven Siegfried

Introduced: 7 Apr 2026

New CVE NOT AVAILABLE CWE-349  (opens in a new tab)
CWE-440  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

@openclaw/zalo is an OpenClaw Zalo channel plugin

Affected versions of this package are vulnerable to Expected Behavior Violation due to insufficient scoping of replay deduplication keys in webhook event processing. An attacker can cause legitimate messages from different conversations or senders to be suppressed by triggering cross-conversation or cross-sender collisions.

CVSS Base Scores

version 4.0
version 3.1