DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

GHSA-MW7W-G3MG-XQM7: GHSA-MW7W-G3MG-XQM7: Authorization Bypass in OpenClaw BlueBubbles Extension via Unfiltered Reactions

GHSA-MW7W-G3MG-XQM7: Authorization Bypass in OpenClaw BlueBubbles Extension via Unfiltered Reactions

Vulnerability ID: GHSA-MW7W-G3MG-XQM7
CVSS Score: N/A
Published: 2026-03-27

OpenClaw versions 2026.3.2 and earlier contain a logic flaw in the BlueBubbles extension where the requireMention policy is not enforced for group chat reactions. This results in unintended information disclosure to connected agents.

TL;DR

A logic flaw in OpenClaw's BlueBubbles extension allows agents to observe group chat reactions despite 'requireMention' privacy policies being active, leading to unauthorized information disclosure.


⚠️ Exploit Status: POC

Technical Details

  • Vulnerability Type: Logic Flaw / Authorization Bypass
  • CWE ID: CWE-285
  • Attack Vector: Network (Messaging Platform)
  • Authentication Required: None (Group Member)
  • Impact: Information Disclosure
  • Exploit Status: Unweaponized / Application Default Behavior

Affected Systems

  • OpenClaw <= 2026.3.2 (BlueBubbles Extension)
  • OpenClaw: <= 2026.3.2 (Fixed in: 2026.3.3)

Code Analysis

Commit: f8c9863

Fix: enforce requireMention policy for BlueBubbles reactions

Mitigation Strategies

  • Upgrade OpenClaw to version 2026.3.3 or later.
  • Temporarily disable the BlueBubbles extension if patching is delayed.
  • Remove OpenClaw agents from sensitive iMessage group chats until the system is updated.

Remediation Steps:

  1. Access the OpenClaw host server.
  2. Pull the latest openclaw release or source code matching version 2026.3.3.
  3. Restart the OpenClaw service and monitor the initialization logs to verify the correct version is running.
  4. Validate the fix by sending a test reaction in a group chat with an agent configured with requireMention=true and confirming no event is enqueued.

References


Read the full report for GHSA-MW7W-G3MG-XQM7 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)