Sender Allowlist Bypass Vulnerability in OpenClaw by OpenClaw
CVE-2026-41358

2.3LOW

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2026-41358?

The vulnerable version of OpenClaw, prior to 2026.4.2, fails to adequately filter Slack thread context based on a sender allowlist. This oversight permits attackers to exploit the system by injecting unauthorized thread messages through replies from allowlisted users, effectively circumventing sender access controls. As a result, malicious actors can manipulate the model context, posing significant risks to security and data integrity.

Affected Version(s)

OpenClaw 0 < 2026.4.2

OpenClaw 2026.4.2

References

CVSS V4

Score:
2.3
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

AntAISecurityLab
.