GHSA-MW7W-G3MG-XQM7: Authorization Bypass in OpenClaw BlueBubbles Extension via Unfiltered Reactions
Vulnerability ID: GHSA-MW7W-G3MG-XQM7
CVSS Score: N/A
Published: 2026-03-27
OpenClaw versions 2026.3.2 and earlier contain a logic flaw in the BlueBubbles extension where the requireMention policy is not enforced for group chat reactions. This results in unintended information disclosure to connected agents.
TL;DR
A logic flaw in OpenClaw's BlueBubbles extension allows agents to observe group chat reactions despite 'requireMention' privacy policies being active, leading to unauthorized information disclosure.
⚠️ Exploit Status: POC
Technical Details
- Vulnerability Type: Logic Flaw / Authorization Bypass
- CWE ID: CWE-285
- Attack Vector: Network (Messaging Platform)
- Authentication Required: None (Group Member)
- Impact: Information Disclosure
- Exploit Status: Unweaponized / Application Default Behavior
Affected Systems
- OpenClaw <= 2026.3.2 (BlueBubbles Extension)
-
OpenClaw: <= 2026.3.2 (Fixed in:
2026.3.3)
Code Analysis
Commit: f8c9863
Fix: enforce requireMention policy for BlueBubbles reactions
Mitigation Strategies
- Upgrade OpenClaw to version 2026.3.3 or later.
- Temporarily disable the BlueBubbles extension if patching is delayed.
- Remove OpenClaw agents from sensitive iMessage group chats until the system is updated.
Remediation Steps:
- Access the OpenClaw host server.
- Pull the latest openclaw release or source code matching version 2026.3.3.
- Restart the OpenClaw service and monitor the initialization logs to verify the correct version is running.
- Validate the fix by sending a test reaction in a group chat with an agent configured with requireMention=true and confirming no event is enqueued.
References
Read the full report for GHSA-MW7W-G3MG-XQM7 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)