OpenClaw before 2026.3.22 contains a webhook reply delivery vulnerability that allows attackers to rebind chat replies to unintended users by exploiting mutable username matching instead of stable numeric user identifiers. Attackers can manipulate username changes to redirect webhook-triggered replies to different users, bypassing the intended recipient binding recorded in webhook events.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wv46-v6xc-2qhf | OpenClaw: Synology Chat reply delivery could be rebound through username-based user resolution. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 10 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.22 contains a webhook reply delivery vulnerability that allows attackers to rebind chat replies to unintended users by exploiting mutable username matching instead of stable numeric user identifiers. Attackers can manipulate username changes to redirect webhook-triggered replies to different users, bypassing the intended recipient binding recorded in webhook events. | |
| Title | OpenClaw < 2026.3.22 - Webhook Reply Rebinding via Username Resolution in Synology Chat | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-807 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-10T16:03:28.524Z
Reserved: 2026-04-04T12:32:50.476Z
Link: CVE-2026-35670
No data.
Status : Received
Published: 2026-04-10T17:17:09.413
Modified: 2026-04-10T17:17:09.413
Link: CVE-2026-35670
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA