GHSA-77W2-CRQV-CMV3: Authorization Bypass via Legacy Card Callbacks in OpenClaw Feishu Integration
Vulnerability ID: GHSA-77W2-CRQV-CMV3
CVSS Score: 5.3
Published: 2026-03-29
An authorization bypass vulnerability in the OpenClaw Feishu integration permits attackers to execute privileged commands. By crafting legacy interactive cards that lack modern structure markers, attackers can bypass the Direct Message (DM) pairing security checks.
TL;DR
OpenClaw versions prior to 2026.3.26 fail to enforce Direct Message (DM) pairing validation on legacy Feishu interactive card callbacks, allowing unauthorized users to execute privileged commands.
⚠️ Exploit Status: POC
Technical Details
- Vulnerability Class: Improper Authorization (CWE-285)
- Component: openclaw npm package
- Attack Vector: Network (Crafted JSON Card)
- Severity: Medium
- Exploit Status: Proof of Concept
- Fix Availability: Available in version 2026.3.26
Affected Systems
- OpenClaw Feishu Channel Integration
-
openclaw: < 2026.3.26 (Fixed in:
2026.3.26)
Code Analysis
Commit: 81c4597
Implement egress filtering in Feishu channel to block legacy interactive elements missing structured envelopes.
Added containsLegacyFeishuCardCommandValue and hasLegacyFeishuCardCommandValue in extensions/feishu/src/channel.ts.
Mitigation Strategies
- Upgrade the openclaw package to version 2026.3.26 or later.
- Enforce DM pairing across all channels by setting the dmPolicy to 'pairing'.
- Audit custom integration logic to ensure outbound card components utilize modern structured interaction envelopes.
Remediation Steps:
- Identify all Node.js projects utilizing the openclaw dependency.
- Update package.json to require "openclaw": ">=2026.3.26".
- Run package manager update commands (e.g., npm install or yarn upgrade).
- Validate that any local Feishu card generation templates use the 'oc' version specifier for interaction properties.
- Restart the OpenClaw service instances to apply the patch.
References
- GitHub Security Advisory GHSA-77W2-CRQV-CMV3
- OpenClaw Fix Commit
- OpenClaw Security Tracking Repository
- AliCloud Vulnerability Database AVD-2026-1863798
Read the full report for GHSA-77W2-CRQV-CMV3 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)