Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

465+ Articles
115+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-32975: OpenClaw Zalouser Weak Authorization via Mutable Group Display Names
CVE-2026-32975: OpenClaw Zalouser Weak Authorization via Mutable Group Display Names

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-32975

CVE-2026-32975: OpenClaw Zalouser Weak Authorization via Mutable Group Display Names

A critical CVSS 9.8 authorization bypass in OpenClaw's Zalouser allowlist mode matches mutable group display names instead of stable identifiers, letting attackers create spoofed groups to hijack channel routing.

Dylan H.

Security Team

March 30, 2026
5 min read

Affected Products

  • OpenClaw before 2026.3.12

Executive Summary

A critical-severity authorization bypass vulnerability (CVE-2026-32975, CVSS 9.8) has been disclosed in OpenClaw versions prior to 2026.3.12. The flaw is in OpenClaw's Zalouser allowlist mode, which validates channel authorization by matching group display names rather than stable group identifiers. Since display names are mutable and not unique, an attacker can create a new group with a name identical to an allowlisted group, route messages through it, and bypass authorization controls to access protected channels.

CVSS Score: 9.8 (Critical)

Published to the NVD on March 29, 2026, this vulnerability undermines channel-level access controls in any OpenClaw deployment using Zalouser in allowlist mode.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-32975
CVSS Score9.8 (Critical)
CWECWE-863: Incorrect Authorization
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Vulnerable ComponentZalouser allowlist mode — group authorization logic
Root CauseAuthorization checks display name (mutable) instead of stable group ID

Affected Products

VendorProductAffected VersionsFixed Version
OpenClawOpenClawAll versions before 2026.3.122026.3.12

Vulnerability Details

Mutable Display Name Authorization Flaw

OpenClaw's Zalouser component provides channel-based message routing with an allowlist mode that restricts which groups can send messages to protected channels. The allowlist should be enforced using stable, immutable group identifiers — such as internal group IDs or UUIDs. Instead, the Zalouser implementation compares group display names (human-readable labels that can be changed by users with the appropriate permissions).

Because display names are not unique and can be duplicated:

  1. An attacker identifies the display name of an allowlisted group (e.g., admins)
  2. The attacker creates a new group with the identical display name admins
  3. When the attacker's group routes a message, Zalouser matches the display name against the allowlist and incorrectly authorizes the request
  4. Messages are routed to the protected channel despite the sending group not being the intended allowlisted group

Attack flow:

1. Attacker obtains the display name of an allowlisted group (e.g., via enumeration)
2. Attacker creates a new group: displayName = "admins" (or other allowlisted name)
3. Attacker routes a message to a protected channel via the spoofed group
4. Zalouser checks: group.displayName == allowlist entry → TRUE (false positive)
5. Channel authorization is bypassed; message is delivered to the protected channel
6. Attacker may exfiltrate channel content or inject rogue messages

Impact of Successful Exploitation

Successful exploitation allows an attacker to:

  • Bypass channel authorization — send messages to channels restricted to specific allowlisted groups
  • Inject rogue messages — plant content, commands, or instructions in protected channels
  • Exfiltrate channel data — read replies or trigger agent workflows that expose sensitive information
  • Escalate privileges via channel commands — if protected channels accept command messages, arbitrary commands can be injected
  • Disrupt agent coordination — interfere with legitimate group-to-channel workflows

Deployment Context and Risk

Zalouser allowlist mode is typically used in environments where multiple groups share an OpenClaw deployment and channel isolation is a security requirement. Any such deployment is affected.

Deployment ContextRisk LevelNotes
Multi-tenant OpenClaw deploymentsCriticalCross-group channel access with any low-privilege account
Enterprise agent platformsCriticalProtected workflow channels can be injected into
CI/CD pipeline integrationsHighBuild or deployment channels may accept injected commands
Internal chat integrationsHighSensitive channels exposed to spoofed group routing

Recommended Mitigations

1. Upgrade Immediately

Upgrade to OpenClaw 2026.3.12, which patches Zalouser to compare stable group identifiers (e.g., internal group IDs) instead of mutable display names.

# Upgrade OpenClaw to 2026.3.12 or later

2. Audit Existing Group Display Names

Before patching, audit your deployment for any groups with display names that duplicate allowlisted group names:

1. Export full group list from your OpenClaw/Zalo environment
2. Identify all groups whose display names match any Zalouser allowlist entry
3. Investigate whether any such duplicate groups were created by unauthorized users
4. Rename or remove unauthorized groups immediately

3. Restrict Group Creation Permissions

Limit which users can create new groups or modify group display names to prevent future spoofing.

4. Monitor for Exploitation Indicators

IndicatorDescription
Duplicate group display names matching allowlisted groupsPotential spoofing setup
Messages from unexpected groups in protected channelsExploitation in progress
Zalouser authorization logs showing new group IDs for allowlisted namesMutable name mismatch detection

Post-Remediation Checklist

  1. Upgrade to 2026.3.12 — confirm the stable ID-based authorization logic is active
  2. Audit group display names — identify and remove any spoofed groups
  3. Review protected channel message history — check for unauthorized messages injected before patching
  4. Restrict group management permissions — apply principle of least privilege
  5. Rotate channel credentials or tokens if unauthorized access to protected channels is confirmed

References

  • CVE-2026-32975 — NVD
  • CWE-863: Incorrect Authorization — MITRE

Related Reading

  • CVE-2026-32973: OpenClaw Exec Allowlist Bypass
  • CVE-2026-32987: OpenClaw Bootstrap Code Replay Privilege Escalation
#CVE#OpenClaw#Authorization Bypass#Zalouser#NVD#Vulnerability

Related Articles

CVE-2026-32973: OpenClaw Exec Allowlist Bypass via Glob Wildcard Overmatch

A critical CVSS 9.8 vulnerability in OpenClaw allows attackers to bypass the exec allowlist by exploiting improper glob pattern normalization where the ? wildcard ovematches across POSIX path segments.

5 min read

CVE-2026-32987: OpenClaw Bootstrap Code Replay Enables Privilege Escalation to operator.admin

A critical CVSS 9.8 vulnerability in OpenClaw allows attackers to replay a valid bootstrap setup code multiple times before approval, escalating device pairing scopes up to operator.admin privilege level.

5 min read

CVE-2026-22172: OpenClaw Critical Authorization Bypass via WebSocket Scope Elevation

A critical CVSS 9.9 authorization bypass in OpenClaw allows authenticated users to self-declare elevated scopes over WebSocket connections without...

6 min read
Back to all Security Alerts