## Summary Matrix room control-command authorization used the effective allowlist for room traffic, which included sender IDs learned from the Matrix DM pairing store. A sender who was allowed only for a Matrix DM could therefore authorize room control commands when they also posted in a bot room....
Full CISO analysis pending enrichment.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | npm | > 2026.3.28, < 2026.4.15 | 2026.4.15 |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
Patch available
Update openclaw to version 2026.4.15
Compliance Impact
Compliance analysis pending. Sign in for full compliance mapping when available.
Frequently Asked Questions
What is GHSA-2gvc-4f3c-2855?
OpenClaw: Matrix room control-command authorization no longer trusts DM pairing-store entries
Is GHSA-2gvc-4f3c-2855 actively exploited?
No confirmed active exploitation of GHSA-2gvc-4f3c-2855 has been reported, but organizations should still patch proactively.
How to fix GHSA-2gvc-4f3c-2855?
Update to patched version: openclaw 2026.4.15.
What is the CVSS score for GHSA-2gvc-4f3c-2855?
No CVSS score has been assigned yet.
Technical Details
NVD Description
## Summary Matrix room control-command authorization used the effective allowlist for room traffic, which included sender IDs learned from the Matrix DM pairing store. A sender who was allowed only for a Matrix DM could therefore authorize room control commands when they also posted in a bot room. ## Impact This bypass let a DM-paired Matrix sender cross the DM/room authorization boundary and run Matrix room control commands without being present in the configured room allowlist, room membership list, or group allowlist. The issue required a sender already present in the pairing store and able to send to the target Matrix room. Severity remains high because room control commands can drive privileged OpenClaw behavior depending on the deployment's command and tool policy. ## Affected versions - Affected: `> 2026.3.28, < 2026.4.15` - Patched: `2026.4.15` ## Fix OpenClaw `2026.4.15` fixes the authorization boundary. Room control-command authorizers now use only configured sender IDs, effective room users, and group allowlists; DM pairing-store entries no longer authorize room commands. A follow-up change also skips DM pairing-store reads on room traffic. Verified in `v2026.4.15`: - `extensions/matrix/src/matrix/monitor/access-state.ts` builds room command authorizers from `commandAllowFrom`, which excludes pairing-store sender IDs for room traffic. - `extensions/matrix/src/matrix/monitor/handler.ts` gates room control commands through those authorizers. - `extensions/matrix/src/matrix/monitor/access-state.test.ts` covers a DM pairing-store sender and verifies it cannot authorize room control commands. Fix commits included in `v2026.4.15` and absent from `v2026.4.14`: - `f8705f512b09043df02b5da372c33374734bd921` via PR #67294 - `2bfd808a83116bd888e3e2633a61473fa2ed81b6` via PR #67325 Thanks to @nexrin and Keen Security Lab for reporting this issue.
Weaknesses (CWE)
References
- github.com/advisories/GHSA-2gvc-4f3c-2855
- github.com/openclaw/openclaw/commit/2bfd808a83116bd888e3e2633a61473fa2ed81b6
- github.com/openclaw/openclaw/commit/f8705f512b09043df02b5da372c33374734bd921
- github.com/openclaw/openclaw/pull/67294
- github.com/openclaw/openclaw/pull/67325
- github.com/openclaw/openclaw/security/advisories/GHSA-2gvc-4f3c-2855
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert