OpenClaw's Microsoft Teams plugin widened group sender authorization when a team/channel route allowlist was configured but groupAllowFrom was empty. Before the fix, a matching route allowlist entry could cause the message handler to synthesize wildcard sender authorization for that route, allowing any sender in the matched team/channel to bypass the intended groupPolicy: "allowlist" sender check.
This does not affect default unauthenticated access, but it does weaken a documented Teams group authorization boundary and can allow unauthorized group senders to trigger replies in allowlisted Teams routes.
openclaw (npm)2026.3.7<= 2026.3.72026.3.888aee9161e0e6d32e810a25711e32a808a1777b2v2026.3.8 published on March 9, 2026.npm view openclaw version resolves to 2026.3.8.v2026.3.8 tree.Thanks @zpbrent for reporting.
{
"nvd_published_at": null,
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-289"
],
"github_reviewed_at": "2026-03-12T14:21:35Z"
}