GHSA-G353-MGV3-8PCJ: Authentication Bypass via Forged Webhook Events in OpenClaw Feishu Integration
Vulnerability ID: GHSA-G353-MGV3-8PCJ
CVSS Score: 8.6
Published: 2026-03-13
OpenClaw versions prior to 2026.3.12 contain a high-severity authentication bypass vulnerability in the Feishu channel integration. When configured in webhook mode without an encryption key, the system relies solely on a static plaintext token, allowing unauthenticated remote attackers to inject forged events and execute unauthorized actions.
TL;DR
OpenClaw < 2026.3.12 is vulnerable to event forgery in its Feishu webhook integration due to missing mandatory encryption validation, allowing arbitrary command execution.
⚠️ Exploit Status: POC
Technical Details
- CVSS Score: 8.6 (High)
- CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N
- CWE ID: CWE-290, CWE-345
- Attack Vector: Network
- Privileges Required: None
- Exploit Status: PoC / Active
Affected Systems
- OpenClaw Feishu (Lark) Channel Integration
- OpenClaw Webhook Listener
-
openclaw: < 2026.3.12 (Fixed in:
2026.3.12)
Code Analysis
Commit: 7844bc8
Fix: enforce encryptKey requirement for Feishu webhook mode
Exploit Details
- GitHub Advisory: Details regarding the verification token bypass methodology.
Mitigation Strategies
- Upgrade OpenClaw core to version 2026.3.12 or newer.
- Enforce AES payload encryption in the Feishu Open Platform console.
- Migrate from webhook connection mode to websocket connection mode if inbound HTTP routing is not strictly required.
Remediation Steps:
- Navigate to the Feishu Open Platform console for your registered application.
- Select 'Development', then 'Events & Callbacks', and locate the 'Encryption' section.
- Generate and copy the 'Encrypt Key'.
- Update the openclaw.json configuration file to include the 'encryptKey' property.
- Restart the OpenClaw service to apply the configuration validation.
- Verify the application boots successfully and test event reception.
References
- GitHub Security Advisory GHSA-G353-MGV3-8PCJ
- Fix Commit 7844bc89a1612800810617c823eb0c76ef945804
- Pull Request 44087
- OpenClaw v2026.3.12 Release Notes
Read the full report for GHSA-G353-MGV3-8PCJ on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)