OpenClaw BlueBubbles Group Allowlist Bypass via DM Pairing Fallback
Vulnerability ID: GHSA-25PW-4H6W-QWVM
CVSS Score: 5.4
Published: 2026-03-03
A logical vulnerability exists in the authorization middleware of the OpenClaw BlueBubbles extension, enabling unauthorized users to bypass group chat access controls. The flaw allows the trusted identity of a user established in a Direct Message (DM) context—stored in a local pairing store—to incorrectly satisfy authorization requirements in Group Chat contexts, even when strict allowlists are configured. This effectively renders the groupPolicy allowlist ineffective against any user who has previously paired with the assistant via a private channel.
TL;DR
Users paired with the OpenClaw assistant via private DMs can bypass strict allowlists in Group Chats due to an incorrect fallback in the authorization logic. Fixed in version 2026.2.25.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-285
- Attack Vector: Network
- CVSS Score: 5.4
- Impact: Authorization Bypass
- Affected Component: BlueBubbles Middleware
- Exploit Status: PoC Available
Affected Systems
- OpenClaw (npm package)
- BlueBubbles Extension for OpenClaw
-
openclaw: < 2026.2.25 (Fixed in:
2026.2.25)
Mitigation Strategies
- Upgrade OpenClaw to version 2026.2.25 or later.
- Audit
groupAllowFromlists inopenclaw.yaml. - Restrict
dmPolicytoallowlistto prevent unauthorized pairing.
Remediation Steps:
- Stop the OpenClaw service.
- Run
npm install openclaw@latestto fetch the patched version. - Verify the version is >= 2026.2.25.
- Run
openclaw doctor --fixto normalize user IDs in configuration. - Restart the OpenClaw service.
References
Read the full report for GHSA-25PW-4H6W-QWVM on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)