GHSA-qgp3-3rj7-qqq4: Duplicate Advisory: OpenClaw: Discord Slash Commands Bypass Group DM Channel Allowlist
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-rvvf-6vh3-9j43. This link is maintained to preserve external references.
Original Description
OpenClaw before 2026.3.31 contains an authorization bypass vulnerability in Discord slash command and autocomplete paths that fail to enforce group DM channel allowlist restrictions. Authorized Discord users can bypass channel restrictions by invoking slash commands, allowing access to restricted group DM channels.
References
- github.com/advisories/GHSA-qgp3-3rj7-qqq4
- github.com/openclaw/openclaw/commit/8fdb19676ab44cf85d47ee13c578195f2e527591
- github.com/openclaw/openclaw/security/advisories/GHSA-rvvf-6vh3-9j43
- nvd.nist.gov/vuln/detail/CVE-2026-41348
- www.vulncheck.com/advisories/openclaw-group-dm-channel-allowlist-bypass-via-discord-slash-commands
Code Behaviors & Features
Detect and mitigate GHSA-qgp3-3rj7-qqq4 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →