GHSA-qm77-8qjp-4vcm

Suggest an improvement
Source
https://github.com/advisories/GHSA-qm77-8qjp-4vcm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-qm77-8qjp-4vcm/GHSA-qm77-8qjp-4vcm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qm77-8qjp-4vcm
Aliases
  • CVE-2026-41358
Published
2026-05-04T16:52:21Z
Modified
2026-05-05T16:13:19.533407Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
  • 2.3 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
OpenClaw: Slack thread context could include messages from non-allowlisted senders
Details

Summary

Before OpenClaw 2026.4.2, Slack thread starter and thread-history context fetched through the API was not filtered by the effective sender allowlist. Messages from non-allowlisted senders could still enter the agent context when an allowlisted user replied in the same thread.

Impact

A Slack deployment that relied on sender allowlists could still feed non-allowlisted thread content into the model context through thread history. This was a sender-access-control bypass on Slack thread context, not a direct channel-auth bypass.

Affected Packages / Versions

  • Package: openclaw (npm)
  • Affected versions: <= 2026.4.1
  • Patched versions: >= 2026.4.2
  • Latest published npm version: 2026.4.1

Fix Commit(s)

  • ac5bc4fb37becc64a2ec314864cca1565e921f2d — filter Slack thread context by the effective allowlist

Release Process Note

The fix is present on main and is staged for OpenClaw 2026.4.2. Publish this advisory after the 2026.4.2 npm release is live.

OpenClaw thanks @AntAISecurityLab for reporting.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-05-04T16:52:21Z",
    "cwe_ids": [
        "CWE-346"
    ],
    "severity": "LOW",
    "nvd_published_at": null
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.4.2

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-qm77-8qjp-4vcm/GHSA-qm77-8qjp-4vcm.json"
last_known_affected_version_range
"<= 2026.4.1"