GHSA-77w2-crqv-cmv3

Suggest an improvement
Source
https://github.com/advisories/GHSA-77w2-crqv-cmv3
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-77w2-crqv-cmv3/GHSA-77w2-crqv-cmv3.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-77w2-crqv-cmv3
Published
2026-03-29T15:49:17Z
Modified
2026-03-29T16:06:08.150339Z
Summary
OpenClaw: Feishu Raw Card Send Surface Can Mint Legacy Card Callbacks That Bypass DM Pairing
Details

Summary

Feishu Raw card Send Surface Can Mint Legacy Card Callbacks That Bypass DM Pairing

Affected Packages / Versions

  • Package: openclaw
  • Affected versions: <= 2026.3.24
  • First patched version: 2026.3.25
  • Latest published npm version at verification time: 2026.3.24

Details

Feishu raw card sends could previously mint legacy callback payloads that bypassed DM pairing and let unpaired recipients reach callback handling. Commit 81c45976db532324b5a0918a70decc19520dc354 rejects legacy raw-card command payloads so callbacks stay on the normal paired path.

Verified vulnerable on tag v2026.3.24 and fixed on main by commit 81c45976db532324b5a0918a70decc19520dc354.

Fix Commit(s)

  • 81c45976db532324b5a0918a70decc19520dc354
Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-288",
        "CWE-863"
    ],
    "nvd_published_at": null,
    "github_reviewed_at": "2026-03-29T15:49:17Z",
    "severity": "MODERATE"
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.3.28

Database specific

last_known_affected_version_range
"<= 2026.3.24"
source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-77w2-crqv-cmv3/GHSA-77w2-crqv-cmv3.json"