OpenClaw before 2026.3.25 contains an authentication bypass vulnerability in raw card send surface that allows unpaired recipients to mint legacy callback payloads. Attackers can send raw card commands to bypass DM pairing restrictions and reach callback handling without proper authorization.
https://www.vulncheck.com/advisories/openclaw-dm-pairing-bypass-via-legacy-card-callbacks
https://github.com/openclaw/openclaw/security/advisories/GHSA-77w2-crqv-cmv3
https://github.com/openclaw/openclaw/commit/81c45976db532324b5a0918a70decc19520dc354
Published: 2026-04-10
Updated: 2026-04-10
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
Severity: Medium
Base Score: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Severity: Medium
Base Score: 6.9
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Severity: Medium