Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mp66-rf4f-mhh8 | OpenClaw: Google Chat app-url webhook auth accepted non-deployment add-on principals |
Mon, 13 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.22 contains an improper authentication verification vulnerability in Google Chat app-url webhook handling that accepts add-on principals outside intended deployment bindings. Attackers can bypass webhook authentication by providing non-deployment add-on principals to execute unauthorized actions through the Google Chat integration. | |
| Title | OpenClaw < 2026.3.22 - Improper Authentication Verification in Google Chat Webhook | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-290 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-13T18:21:13.275Z
Reserved: 2026-04-04T12:28:49.756Z
Link: CVE-2026-35622
Updated: 2026-04-13T18:20:55.999Z
Status : Analyzed
Published: 2026-04-09T22:16:30.340
Modified: 2026-04-17T12:19:18.723
Link: CVE-2026-35622
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:28:40Z
Github GHSA