Vibe Security Radar
Back to Vulnerabilities

CVE-2026-32021

openclaw/openclaw
Mar 19, 2026CWE-863
TypeScript
Verified by gpt-5.4-high
Severity
MEDIUM6.3
Verdict
CONFIRMED
0.8 confidence
AI Tool
Claude CodeClaude Code
Language
TypeScript

OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in the Feishu allowFrom allowlist implementation that accepts mutable sender display names instead of enforcing ID-only matching. An attacker can set a display name equal to an allowlisted ID string to bypass authorization checks and gain unauthorized access.

How AI Introduced This

Yes. The AI-coauthored commit 2267d58afcc70fe19408b8f0dce108c340f3426d introduced the Feishu regression by replacing the prior ID-only Feishu allowlist logic with code that accepts `senderName` and by feeding mutable profile display names into sender allowlist checks. A later AI-tagged commit (5c2cb6c591e4b63c2df0549ad2202403256e2a96) only reformatted nearby code and did not materially affect authorization; later non-AI commits expanded the same flaw to command and DM authorization paths.

Attribution Chain
Advisory
GitHub Advisory
Fix Commit
4ed87a6— openclaw/openclaw
git blame
extensions/feishu/src/bot.ts
Squash Merge
5c2cb6c— 1 sub-commits
PR Decomposition
File overlap + AI signal analysis
Bug-Introducing Commit
Advisory
GitHub Advisory
Fix Commit
4ed87a6— openclaw/openclaw
git blame
extensions/feishu/src/bot.ts
Bug-Introducing Commit
Bug-Introducing Commits(2)

feat(feishu): sync upstream changes from clawdbot-feishu

Yifeng WangFeb 10, 2026extensions/feishu/src/bot.tsBlame: 90%

Extracted from squash merge 5c2cb6c

feat(feishu): replace built-in SDK with community plugin

Yifeng WangFeb 5, 2026extensions/feishu/src/bot.tsBlame: 90%

Deep Verification

by investigator-override
CONFIRMED0.8
0 tool calls
80%

Yes. The AI-coauthored commit 2267d58afcc70fe19408b8f0dce108c340f3426d introduced the Feishu regression by replacing the prior ID-only Feishu allowlist logic with code that accepts `senderName` and by feeding mutable profile display names into sender allowlist checks. A later AI-tagged commit (5c2cb6c591e4b63c2df0549ad2202403256e2a96) only reformatted nearby code and did not materially affect authorization; later non-AI commits expanded the same flaw to command and DM authorization paths.

AI Signals(2)
Commitb0c67ea
Claude CodeCo-author trailerCo-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>95%
Commit2267d58
Claude CodeCo-author trailerCo-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>95%
Fix Commits(1)