Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. openclaw
  4. ›
  5. GHSA-fhvm-j76f-qmjv

GHSA-fhvm-j76f-qmjv: OpenClaw has a potential access-group authorization bypass if channel type lookup fails

February 17, 2026

When Telegram webhook mode is enabled without a configured webhook secret, OpenClaw may accept unauthenticated HTTP POST requests at the Telegram webhook endpoint and trust attacker-controlled update JSON. This can allow forged Telegram updates that spoof message.from.id / chat.id, potentially bypassing sender allowlists and executing privileged bot commands.

References

  • github.com/advisories/GHSA-fhvm-j76f-qmjv
  • github.com/openclaw/openclaw
  • github.com/openclaw/openclaw/commit/3cbcba10cf30c2ffb898f0d8c7dfb929f15f8930
  • github.com/openclaw/openclaw/commit/5643a934799dc523ec2ef18c007e1aa2c386b670
  • github.com/openclaw/openclaw/commit/633fe8b9c17f02fcc68ecdb5ec212a5ace932f09
  • github.com/openclaw/openclaw/commit/ca92597e1f9593236ad86810b66633144b69314d
  • github.com/openclaw/openclaw/releases/tag/v2026.2.1
  • github.com/openclaw/openclaw/security/advisories/GHSA-fhvm-j76f-qmjv

Code Behaviors & Features

Detect and mitigate GHSA-fhvm-j76f-qmjv with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2026.2.1

Fixed versions

  • 2026.2.1

Solution

Upgrade to version 2026.2.1 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-285: Improper Authorization

Source file

npm/openclaw/GHSA-fhvm-j76f-qmjv.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:02 +0000.