Sender Allowlist Bypass Vulnerability in OpenClaw for MS Teams
CVE-2026-41365

5.3MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
27 April 2026

What is CVE-2026-41365?

OpenClaw prior to version 2026.3.31 is vulnerable to a sender allowlist bypass, enabling attackers to access thread history messages from Microsoft Teams through the Graph API. This flaw allows unauthorized users to circumvent established filtering mechanisms intended to restrict message visibility based on sender criteria. This vulnerability poses significant risks related to data exposure, making it critical for users to update to the latest version to ensure their security against these potential threats.

Affected Version(s)

OpenClaw 0 < 2026.3.31

OpenClaw 2026.3.31

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

AntAISecurityLab
.