CVE-2026-31998 PUBLISHED

OpenClaw 2026.2.22 < 2026.2.24 - Authorization Bypass in Synology Chat Plugin via Empty allowedUserIds

Assigner: VulnCheck
Reserved: 10.03.2026 Published: 19.03.2026 Updated: 19.03.2026

OpenClaw versions 2026.2.22 and 2026.2.23 contain an authorization bypass vulnerability in the synology-chat channel plugin where dmPolicy set to allowlist with empty allowedUserIds fails open. Attackers with Synology sender access can bypass authorization checks and trigger unauthorized agent dispatch and downstream tool actions.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
CVSS Score: 8.3

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 2026.2.22 to 2026.2.24 (excl.)
  • Version 2026.2.24 is unaffected

Credits

  • tdjackey reporter

References

Problem Types

  • CWE-863: Incorrect Authorization CWE