GHSA-86jj-29wc-7q2w: Duplicate Advisory: OpenClaw's Signal reaction-only status events could, in limited cases, be enqueued before access checks
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-792q-qw95-f446. This link is maintained to preserve external references.
Original Description
OpenClaw versions prior to 2026.2.25 contain an access control vulnerability in signal reaction notification handling that allows unauthorized senders to enqueue status events before authorization checks are applied. Attackers can exploit the reaction-only event path in event-handler.ts to queue signal reaction status lines for sessions without proper DM or group access validation.
References
- github.com/advisories/GHSA-86jj-29wc-7q2w
- github.com/openclaw/openclaw/commit/2aa7842adeedef423be7ce283a9144b9f1a0a669
- github.com/openclaw/openclaw/security/advisories/GHSA-792q-qw95-f446
- nvd.nist.gov/vuln/detail/CVE-2026-32050
- www.vulncheck.com/advisories/openclaw-unauthorized-reaction-status-event-enqueue-via-access-check-bypass
Code Behaviors & Features
Detect and mitigate GHSA-86jj-29wc-7q2w with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →