GHSA-52Q4-3XJC-6778: Authorization Bypass via Mutable Metadata in OpenClaw Google Chat Integration
Vulnerability ID: GHSA-52Q4-3XJC-6778
CVSS Score: 8.1
Published: 2026-03-29
OpenClaw versions prior to 2026.3.25 suffer from an authorization bypass vulnerability in the Google Chat integration. The flaw occurs due to reliance on mutable room names for policy enforcement, allowing unprivileged users to escalate privileges by renaming chat spaces.
TL;DR
A flaw in OpenClaw's Google Chat extension (<= 2026.3.24) allows attackers to bypass authorization by renaming a chat space to match a privileged group name. This grants unauthorized access to AI agent tools and data. The vulnerability is fixed in version 2026.3.25.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-863, CWE-639
- Attack Vector: Network
- CVSS Score: 8.1
- Impact: Authorization Bypass / Privilege Escalation
- Exploit Status: Proof of Concept Available
- KEV Status: Not Listed
Affected Systems
- OpenClaw Google Chat Integration
- Node.js npm openclaw package
-
openclaw: <= 2026.3.24 (Fixed in:
2026.3.25)
Code Analysis
Commit: 11ea1f6
Fix group policy rebinding vulnerability by enforcing stable groupId matching
The patch eliminates the usage of groupName and normalizedName in the candidates mapping array and substitutes it with a direct lookup of entries[groupId], paired with a deprecation validation fallback.
Mitigation Strategies
- Upgrade the openclaw package to a patched version
- Update configuration files to strictly use immutable space IDs
Remediation Steps:
- Audit the current deployment to determine the running openclaw version.
- Upgrade the openclaw npm dependency to version 2026.3.25 or higher.
- Query the Google Chat API to identify the stable Space IDs for all environments interacting with the bot.
- Modify the channels.googlechat.groups configuration matrix to replace string-based display names with spaces/XXXXXXXX format IDs.
- Restart the OpenClaw agent service to apply the configuration modifications.
References
Read the full report for GHSA-52Q4-3XJC-6778 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)