Authentication Bypass in OpenClaw Affecting Feishu Webhook and Card-Action Validation
CVE-2026-44109

9.2CRITICAL

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
6 May 2026

What is CVE-2026-44109?

OpenClaw versions prior to 2026.4.15 are vulnerable to an exploitation issue that permits unauthenticated requests to bypass Feishu webhook and card-action validation. This vulnerability arises due to inadequate encryptKey configuration and empty callback tokens, which allow attackers to circumvent signature verification and replay protection measures. As a result, malicious actors can execute arbitrary commands within the system, posing significant security risks.

Affected Version(s)

OpenClaw 0 < 2026.4.15

OpenClaw 2026.4.15

References

CVSS V4

Score:
9.2
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

dhyabi2
.