Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. openclaw
  4. ›
  5. GHSA-jqpf-vj28-9v7r

GHSA-jqpf-vj28-9v7r: Duplicate Advisory: Synology Chat dmPolicy=allowlist failed open on empty allowedUserIds, allowing unauthorized agent dispatch

March 19, 2026 (updated March 20, 2026)

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-gw85-xp4q-5gp9. This link is maintained to preserve external references.

Original Description

OpenClaw versions 2026.2.22 and 2026.2.23 contain an authorization bypass vulnerability in the synology-chat channel plugin where dmPolicy set to allowlist with empty allowedUserIds fails open. Attackers with Synology sender access can bypass authorization checks and trigger unauthorized agent dispatch and downstream tool actions.

References

  • github.com/advisories/GHSA-jqpf-vj28-9v7r
  • github.com/openclaw/openclaw/commit/0ee30361b8f6ef3f110f3a7b001da6dd3df96bb5
  • github.com/openclaw/openclaw/commit/7655c0cb3a47d0647cbbf5284e177f90b4b82ddb
  • github.com/openclaw/openclaw/security/advisories/GHSA-gw85-xp4q-5gp9
  • nvd.nist.gov/vuln/detail/CVE-2026-31998
  • www.vulncheck.com/advisories/openclaw-authorization-bypass-in-synology-chat-plugin-via-empty-alloweduserids

Code Behaviors & Features

Detect and mitigate GHSA-jqpf-vj28-9v7r with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2026.2.22 up to 2026.2.23

Solution

Unfortunately, there is no solution available yet.

Impact 7 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-863: Incorrect Authorization

Source file

npm/openclaw/GHSA-jqpf-vj28-9v7r.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:18:12 +0000.