CVE-2026-33578: OpenClaw: Google Chat and Zalouser group sender allowlist bypass via policy downgrade
(updated )
When only a route-level group allowlist was configured, sender policy resolution silently downgraded from allowlist to open instead of preserving the configured group policy.
References
- github.com/advisories/GHSA-63mg-xp9j-jfcm
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/e64a881ae0fb8af18e451163f4c2d611d60cc8e4
- github.com/openclaw/openclaw/security/advisories/GHSA-63mg-xp9j-jfcm
- nvd.nist.gov/vuln/detail/CVE-2026-33578
- www.vulncheck.com/advisories/openclaw-sender-policy-allowlist-bypass-via-policy-downgrade-in-google-chat-and-zalouser-extensions
Code Behaviors & Features
Detect and mitigate CVE-2026-33578 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →