Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

452+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-32924: OpenClaw Authorization Bypass via Feishu Chat Misclassification
CVE-2026-32924: OpenClaw Authorization Bypass via Feishu Chat Misclassification

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-32924

CVE-2026-32924: OpenClaw Authorization Bypass via Feishu Chat Misclassification

A critical CVSS 9.8 authorization bypass in OpenClaw allows attackers to circumvent groupAllowFrom and requireMention protections in group chats by exploiting a Feishu reaction event misclassification that treats group messages as private conversations.

Dylan H.

Security Team

March 29, 2026
6 min read

Affected Products

  • OpenClaw before 2026.3.12

CVE-2026-32924: Critical Authorization Bypass in OpenClaw Feishu Integration

A critical authorization bypass vulnerability identified as CVE-2026-32924 has been disclosed in OpenClaw versions prior to 2026.3.12. The vulnerability stems from a logic flaw in how OpenClaw processes Feishu (Lark) reaction events: when a reaction event omits the chat_type field, OpenClaw incorrectly classifies the message as originating from a private peer-to-peer (p2p) conversation rather than a group chat. This misclassification causes the bot framework to skip group-specific authorization checks — namely the groupAllowFrom allowlist and requireMention protections — allowing unauthorized users to interact with the bot as though they had explicit permission.

The vulnerability carries a CVSS v3.1 score of 9.8 (Critical) and is classified under CWE-863 — Incorrect Authorization, reflecting a fundamental failure in access control enforcement when processing events with incomplete metadata.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-32924
CVSS Score9.8 (Critical)
CWE ClassificationCWE-863 — Incorrect Authorization
Affected SoftwareOpenClaw before 2026.3.12
Vulnerable ComponentFeishu reaction event handler
Missing Fieldchat_type in reaction events
Bypassed ProtectionsgroupAllowFrom, requireMention
Attack VectorNetwork (Remote)
Authentication RequiredNone — Feishu workspace member
Exploit ComplexityLow
Patch AvailableYes — upgrade to OpenClaw 2026.3.12 or later

Technical Details

Affected Component

The vulnerability resides in OpenClaw's Feishu integration event processing layer. When a user adds a reaction (emoji) to a message, Feishu dispatches a reaction event to the connected bot webhook. In certain Feishu API configurations, reaction events may be delivered without a chat_type field in the event payload — a field OpenClaw uses to determine whether an event originated in a group chat or a direct (p2p) message thread.

Exploitation Mechanism

OpenClaw's authorization logic evaluates groupAllowFrom and requireMention only when it detects the conversation is a group chat:

// Vulnerable logic (simplified)
function handleReactionEvent(event):
  if event.chat_type == "group":
    enforceGroupAllowFrom(event)
    enforceRequireMention(event)
  // If chat_type is missing or "p2p", group restrictions are skipped
  processBotCommand(event)

When chat_type is absent from the reaction event payload, OpenClaw defaults to treating the event as a p2p interaction. All group-level restrictions are bypassed, and the bot processes the command as though the sender is an authorized user.

An attacker who is a member of a Feishu workspace can craft or trigger reaction events with the chat_type field omitted, bypassing:

  • groupAllowFrom — the allowlist of users/groups permitted to interact with the bot in a group chat
  • requireMention — the requirement that the bot must be explicitly @-mentioned before responding

Attack Flow

1. Attacker identifies an OpenClaw bot deployed in a Feishu group chat
   where they are not on the groupAllowFrom allowlist

2. Attacker sends or triggers a Feishu reaction event with chat_type omitted

3. OpenClaw receives the event and checks: chat_type != "group"

4. OpenClaw skips groupAllowFrom and requireMention enforcement

5. Attacker's command is processed as if they are an authorized p2p user

6. Attacker can invoke bot commands, exfiltrate data, or trigger automated actions
   that should only be available to authorized group members

Authorization Bypass Context

This class of vulnerability — where a missing or absent field in an event payload causes security checks to be skipped — is a well-documented failure pattern in event-driven architectures. The root cause is fail-open behavior: when metadata is missing, the system defaults to the less restrictive code path rather than rejecting the event or applying the more restrictive policy.

Secure implementations should:

  • Default to the most restrictive policy when required fields are absent (fail-closed)
  • Reject events with missing required security-relevant fields rather than making assumptions
  • Treat missing chat_type as group context, since this is the more dangerous default

Remediation

Immediate Action Required

Upgrade OpenClaw to version 2026.3.12 or later. This release corrects the chat_type fallback logic to default to group-chat authorization enforcement when the field is absent, preventing the bypass.

Mitigations for Unpatched Deployments

  1. Disable Feishu reaction event handling at the webhook level if the feature is not essential to your deployment
  2. Review bot permissions — minimize the actions the bot can take to limit the blast radius of unauthorized command execution
  3. Monitor bot interaction logs for unexpected commands from users not on the groupAllowFrom allowlist
  4. Restrict Feishu workspace membership to reduce the pool of potential attackers

Code-Level Fix Pattern

The remediation implemented in 2026.3.12 defaults to group-chat enforcement when chat_type is absent:

// Fixed logic — introduced in 2026.3.12
function handleReactionEvent(event):
  // Treat missing chat_type as group (fail-closed)
  chat_type = event.chat_type ?? "group"

  if chat_type == "group":
    enforceGroupAllowFrom(event)
    enforceRequireMention(event)

  processBotCommand(event)

Impact Assessment

Impact AreaDescription
Authorization BypassBypasses groupAllowFrom and requireMention restrictions entirely
Unauthorized Bot AccessNon-allowlisted users can interact with restricted bots
Data ExfiltrationBots with data access can be queried by unauthorized users
Action ExecutionBots with integration capabilities may perform unauthorized operations
Privilege ContextAttack is indistinguishable from legitimate authorized interaction
Exploit BarrierVery low — any Feishu workspace member can exploit via reaction events

Key Takeaways

  1. CVE-2026-32924 is a CVSS 9.8 critical authorization bypass in OpenClaw prior to version 2026.3.12
  2. Feishu reaction events with an absent chat_type field cause OpenClaw to misclassify group interactions as p2p, bypassing groupAllowFrom and requireMention protections
  3. The flaw requires only Feishu workspace membership — no special privileges — making it broadly exploitable in any organization using OpenClaw with Feishu
  4. Upgrade to OpenClaw 2026.3.12 immediately; until patched, consider disabling reaction event processing
  5. This is a fail-open design flaw — the fix ensures missing chat_type defaults to the more restrictive group-chat enforcement path

Sources

  • CVE-2026-32924 — NIST NVD
  • OpenClaw Security Advisory — 2026.3.12
#CVE-2026-32924#Authorization Bypass#OpenClaw#Feishu#CWE-863#Vulnerability#Critical

Related Articles

CVE-2026-22172: OpenClaw Critical Authorization Bypass via WebSocket Scope Elevation

A critical CVSS 9.9 authorization bypass in OpenClaw allows authenticated users to self-declare elevated scopes over WebSocket connections without...

6 min read

CVE-2026-32922: OpenClaw Privilege Escalation via Token Scope Bypass

A critical CVSS 9.9 privilege escalation vulnerability in OpenClaw allows operators with limited pairing scope to mint tokens with unrestricted admin privileges, enabling full platform takeover without authorization.

5 min read

CVE-2016-20049: JAD Java Decompiler Stack-Based Buffer Overflow Enables Arbitrary Code Execution

JAD 1.5.8e-1kali1 and prior contains a critical stack-based buffer overflow vulnerability allowing attackers to execute arbitrary code by supplying input...

6 min read
Back to all Security Alerts