Skip to content

2026-03-29 — OpenClaw MS Teams feedback invocation bypasses sender allowlists and records unauthorized session feedback (GHSA-rf6h-5gpw-qrgq)

Product: OpenClaw (npm package: openclaw)

Impact (per advisory): A Microsoft Teams feedback invocation path bypassed sender allowlists and could record feedback from unauthorized sources.

Why this matters

Allowlists are only useful if every entry point uses them. If a side-path skips sender validation, an attacker can inject state or feedback into a workflow they should not control.

  • Patch/upgrade: update to the fixed OpenClaw release.
  • Centralize sender validation so all Teams entry points use the same allowlist.
  • Treat feedback actions as privileged writes.
  • Add regression tests for unauthorized senders and cross-channel feedback.

Detection / hunting ideas

  • Review logs for feedback events from disallowed senders.
  • Search for any helper that bypasses the primary authorization gate.

References