Skip to content

Commit d6b374b

Browse files
1 parent 98d1a4a commit d6b374b

3 files changed

Lines changed: 79 additions & 46 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-g353-mgv3-8pcj/GHSA-g353-mgv3-8pcj.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g353-mgv3-8pcj",
4-
"modified": "2026-03-13T20:55:34Z",
4+
"modified": "2026-04-06T22:32:29Z",
55
"published": "2026-03-13T20:55:34Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-32974"
8+
],
79
"summary": "OpenClaw: Feishu webhook mode accepted forged events when only `verificationToken` was configured",
810
"details": "### Summary\n\nFeishu webhook mode allowed deployments that configured only `verificationToken` without `encryptKey`. In that state, forged inbound events could be accepted because the weaker configuration did not provide the required cryptographic verification boundary.\n\n### Impact\n\nAn unauthenticated network attacker who could reach the webhook endpoint could inject forged Feishu events, impersonate senders, and potentially trigger downstream tool execution subject to the local agent policy.\n\n### Affected versions\n\n`openclaw` `<= 2026.3.11`\n\n### Patch\n\nFixed in `openclaw` `2026.3.12`. Feishu webhook mode now fails closed unless `encryptKey` is configured, and the webhook transport rejects missing or invalid signatures before dispatch. Update to `2026.3.12` or later and configure `encryptKey` for webhook deployments.",
911
"severity": [
@@ -41,6 +43,10 @@
4143
"type": "WEB",
4244
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g353-mgv3-8pcj"
4345
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32974"
49+
},
4450
{
4551
"type": "WEB",
4652
"url": "https://github.com/openclaw/openclaw/pull/44087"
@@ -56,6 +62,10 @@
5662
{
5763
"type": "WEB",
5864
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.3.12"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://www.vulncheck.com/advisories/openclaw-forged-event-injection-via-feishu-webhook-verification-token"
5969
}
6070
],
6171
"database_specific": {
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-vjqw-w5jr-g9w5",
4+
"modified": "2026-04-06T22:32:19Z",
5+
"published": "2026-03-29T15:30:19Z",
6+
"withdrawn": "2026-04-06T22:32:19Z",
7+
"aliases": [],
8+
"summary": "Duplicate Advisory: OpenClaw: Feishu webhook mode accepted forged events when only `verificationToken` was configured",
9+
"details": "### Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-g353-mgv3-8pcj. This link is maintained to preserve external references.\n\n### Original Description\nOpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing acceptance of forged events. Unauthenticated network attackers can inject forged Feishu events and trigger downstream tool execution by reaching the webhook endpoint.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
}
19+
],
20+
"affected": [
21+
{
22+
"package": {
23+
"ecosystem": "npm",
24+
"name": "openclaw"
25+
},
26+
"ranges": [
27+
{
28+
"type": "ECOSYSTEM",
29+
"events": [
30+
{
31+
"introduced": "0"
32+
},
33+
{
34+
"fixed": "2026.3.12"
35+
}
36+
]
37+
}
38+
],
39+
"database_specific": {
40+
"last_known_affected_version_range": "<= 2026.3.11"
41+
}
42+
}
43+
],
44+
"references": [
45+
{
46+
"type": "WEB",
47+
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g353-mgv3-8pcj"
48+
},
49+
{
50+
"type": "ADVISORY",
51+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32974"
52+
},
53+
{
54+
"type": "WEB",
55+
"url": "https://www.vulncheck.com/advisories/openclaw-forged-event-injection-via-feishu-webhook-verification-token"
56+
}
57+
],
58+
"database_specific": {
59+
"cwe_ids": [
60+
"CWE-347"
61+
],
62+
"severity": "HIGH",
63+
"github_reviewed": true,
64+
"github_reviewed_at": "2026-04-06T22:32:19Z",
65+
"nvd_published_at": "2026-03-29T13:17:01Z"
66+
}
67+
}

advisories/unreviewed/2026/03/GHSA-vjqw-w5jr-g9w5/GHSA-vjqw-w5jr-g9w5.json

Lines changed: 0 additions & 44 deletions
This file was deleted.

0 commit comments

Comments
 (0)