OpenClaw's /allowlist endpoint fails to enforce owner-only access control, allowing any authorized non-owner sender to write allowlist entries to channels they don't own — effectively collapsing channel-level security boundaries within the local AI assistant. While no CISA KEV entry or public exploit exists and exploitation requires prior authorized access, this class of broken function-level authorization becomes significantly more dangerous given OpenClaw's known-troubled supply chain: the package carries 60+ prior CVEs and is directly linked to AIID #1368, where malicious skills delivered AMOS credential-stealing malware to users. A threat actor already embedded via a malicious skill could exploit this flaw to expand allowlist access across privileged channels without owner credentials. Upgrade to openclaw v2026.4.8 immediately and audit all existing allowlist configurations for unauthorized entries.
Risk Assessment
Medium risk overall, but contextually elevated for organizations relying on OpenClaw's channel isolation model as a meaningful security boundary. Exploitation requires existing authorized non-owner access, which limits blast radius in single-user local deployments. However, in multi-user or skill-augmented configurations, this authorization flaw becomes a viable privilege escalation stepping stone — particularly given the package's history of 60+ CVEs and documented exploitation of its skills ecosystem for credential theft. No public exploit or scanner template exists, keeping near-term exploitation likelihood low absent a targeted attacker.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | npm | < 2026.4.8 | 2026.4.8 |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
- Upgrade openclaw to v2026.4.8 immediately — the patched version enforces owner-only authorization on all allowlist writes and includes targeted regression tests for the affected security boundary.
- Audit existing allowlist configurations across all channels for unauthorized entries, prioritizing high-privilege or administrative channels.
- Until patched, restrict authorized senders to the minimum required set and monitor /allowlist API calls for cross-channel write patterns.
- Given AIID #1368, conduct a full inventory of installed OpenClaw skills and remove any unverified or third-party skills from untrusted sources.
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Frequently Asked Questions
What is GHSA-vc32-h5mq-453v?
OpenClaw's /allowlist endpoint fails to enforce owner-only access control, allowing any authorized non-owner sender to write allowlist entries to channels they don't own — effectively collapsing channel-level security boundaries within the local AI assistant. While no CISA KEV entry or public exploit exists and exploitation requires prior authorized access, this class of broken function-level authorization becomes significantly more dangerous given OpenClaw's known-troubled supply chain: the package carries 60+ prior CVEs and is directly linked to AIID #1368, where malicious skills delivered AMOS credential-stealing malware to users. A threat actor already embedded via a malicious skill could exploit this flaw to expand allowlist access across privileged channels without owner credentials. Upgrade to openclaw v2026.4.8 immediately and audit all existing allowlist configurations for unauthorized entries.
Is GHSA-vc32-h5mq-453v actively exploited?
No confirmed active exploitation of GHSA-vc32-h5mq-453v has been reported, but organizations should still patch proactively.
How to fix GHSA-vc32-h5mq-453v?
1. Upgrade openclaw to v2026.4.8 immediately — the patched version enforces owner-only authorization on all allowlist writes and includes targeted regression tests for the affected security boundary. 2. Audit existing allowlist configurations across all channels for unauthorized entries, prioritizing high-privilege or administrative channels. 3. Until patched, restrict authorized senders to the minimum required set and monitor /allowlist API calls for cross-channel write patterns. 4. Given AIID #1368, conduct a full inventory of installed OpenClaw skills and remove any unverified or third-party skills from untrusted sources.
What systems are affected by GHSA-vc32-h5mq-453v?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, local AI assistants, multi-channel AI agent deployments.
What is the CVSS score for GHSA-vc32-h5mq-453v?
No CVSS score has been assigned yet.
Technical Details
NVD Description
## Impact /allowlist omits owner-only enforcement for cross-channel allowlist writes. An authorized non-owner sender could attempt allowlist writes against a different channel. OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<=v2026.4.1` - Patched versions: `2026.4.8` ## Fix The issue was fixed on `main` and is available in the patched npm version listed above. The verified fixed tree is commit `d7c3210cd6f5fdfdc1beff4c9541673e814354d5`. ## Verification The fix was re-checked against `main` before publication, including targeted regression tests for the affected security boundary. ## Credits Thanks @zsxsoft and @KeenSecurityLab for reporting.
Exploitation Scenario
An attacker installs or compromises a malicious OpenClaw skill that operates as an authorized non-owner sender on a victim's low-privilege channel. Using the unpatched /allowlist endpoint, the skill sends crafted write requests targeting a high-privilege administrative channel's allowlist, injecting an attacker-controlled identity. With allowlist access to the administrative channel established without owner credentials, the attacker can invoke agent tools, exfiltrate data, or persist across sessions — escalating from a limited skill context to broader agent access across the entire multi-channel deployment.
References
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert