Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qm77-8qjp-4vcm | OpenClaw: Slack thread context could include messages from non-allowlisted senders |
Fri, 24 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.2 fails to filter Slack thread context by sender allowlist, allowing non-allowlisted messages to enter agent context. Attackers can inject unauthorized thread messages through allowlisted user replies to bypass sender access controls and manipulate model context. | |
| Title | OpenClaw < 2026.4.2 - Sender Allowlist Bypass via Slack Thread Context | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-346 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-24T16:34:31.555Z
Reserved: 2026-04-20T14:07:26.649Z
Link: CVE-2026-41358
Updated: 2026-04-24T16:34:27.732Z
Status : Analyzed
Published: 2026-04-23T22:16:43.350
Modified: 2026-05-01T20:23:58.937
Link: CVE-2026-41358
No data.
OpenCVE Enrichment
Updated: 2026-04-28T07:15:19Z
Github GHSA