LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-32924

CVE-2026-32924 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 31, 2026

OpenClaw - Authorization Bypass

Published: March 29, 2026Updated: March 31, 2026Remote Exploitable

Overview

OpenClaw < 2026.3.12 contains an authorization bypass caused by misclassification of Feishu reaction events with omitted chat_type, letting attackers bypass groupAllowFrom and requireMention protections in group chats, exploit requires crafted reaction events.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 4.1%(Probability of exploitation in next 30 days)

Impact

Attackers can bypass group chat authorization protections, potentially allowing unauthorized actions in group conversations.

Mitigation

Update to version 2026.3.12 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 29, 2026

šŸ”“ CVE-2026-32924 - Critical (9.8) OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where Feishu reaction events with omitted chat_type are misclassified as p2p conversations instead of group chats. Attackers can exploit this misclassification to bypass grou... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-32924/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-32924
Severity
Critical
CVSS Score
9.8
Type
broken_access_control
Status
confirmed
EPSS
4.1%
Social Posts
1

CWE

  • CWE-863

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

4.1%Probability of exploitation in the next 30 days