CVE-2026-41365

medium

Description

OpenClaw before 2026.3.31 contains a sender allowlist bypass vulnerability in MS Teams thread history fetched via Graph API. Attackers can retrieve thread messages that should be filtered by sender allowlists, bypassing message filtering restrictions.

References

https://www.vulncheck.com/advisories/openclaw-sender-allowlist-bypass-via-graph-api-thread-history

https://github.com/openclaw/openclaw/security/advisories/GHSA-chfm-xgc4-47rj

https://github.com/openclaw/openclaw/commit/5cca38084074fb5095aa11b6a59820d63e4937c9

Details

Source: Mitre, NVD

Published: 2026-04-28

Updated: 2026-04-28

Risk Information

CVSS v2

Base Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 5.4

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Severity: Medium

CVSS v4

Base Score: 5.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Severity: Medium