GHSA-GW85-XP4Q-5GP9: Authorization Bypass in OpenClaw Synology Chat Extension
Vulnerability ID: GHSA-GW85-XP4Q-5GP9
CVSS Score: 9.8
Published: 2026-03-03
A critical authorization bypass vulnerability exists in the Synology Chat extension of the OpenClaw AI assistant infrastructure. The vulnerability arises from a 'fail-open' logic error in the user allowlist enforcement mechanism. When the dmPolicy is configured to allowlist but the list of allowed user IDs is left empty, the system defaults to permitting all traffic rather than denying it. This flaw allows unauthenticated remote attackers to interact with the AI agent, potentially triggering sensitive tools or workflows intended only for authorized administrators.
TL;DR
OpenClaw's Synology Chat extension fails to enforce access controls when an allowlist is empty, effectively treating a restricted policy as an open one. This allows any user with access to the webhook to dispatch AI agents and execute commands.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-863
- Vulnerability Type: Incorrect Authorization
- CVSS Score: 9.8 (Critical)
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
Affected Systems
- OpenClaw (Synology Chat Extension)
-
OpenClaw: < 2026-02-24 (commit 0ee3036) (Fixed in:
commit 0ee3036)
Code Analysis
Commit: 0ee3036
fix(synology-chat): fail closed empty allowlist
Commit: 7655c0c
docs(changelog): add synology-chat allowlist fail-closed note
Mitigation Strategies
- Update OpenClaw to the latest version immediately.
- Explicitly populate
allowedUserIdsif usingdmPolicy: "allowlist". - Use
dmPolicy: "open"only if the webhook is not publicly accessible.
Remediation Steps:
- Pull the latest changes from the OpenClaw repository (commit
0ee3036or later). - Review the
extensions/synology-chat/config.tsor environment variables. - Ensure
dmPolicyis set toallowlist. - Verify that
allowedUserIdscontains at least one valid administrator ID. - Restart the OpenClaw service to apply changes.
References
Read the full report for GHSA-GW85-XP4Q-5GP9 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)