Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-32924 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: OpenClaw misclassifies Feishu reaction events when `chat_type` is missing. <br>πŸ”₯ **Consequences**: It treats group chats as private (DM) chats.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-863 (Incorrect Authorization). <br>πŸ” **Flaw**: Logic error in event classification. <br>⚠️ **Root**: Omitted `chat_type` field triggers false 'peer-to-peer' assumption.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: OpenClaw. <br>πŸ“‰ **Affected**: Versions **< 2026.3.12**. <br>πŸ€– **Component**: Feishu integration module (Reaction Events).

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Inject unauthorized reactions in protected groups. <br>πŸ”“ **Privileges**: Bypass admin/group restrictions. <br>πŸ“Š **Data**: Potential info leakage via unauthorized interactions.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. <br>πŸ”‘ **Auth**: None required (PR:N). <br>🌐 **Network**: Remote (AV:N). <br>πŸ‘€ **UI**: No user interaction needed (UI:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp**: **No** public PoC listed. <br>πŸ”— **Refs**: VulnCheck & GitHub Advisory available. <br>⚠️ **Risk**: High CVSS (9.8) suggests easy theoretical exploitation.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for OpenClaw < 2026.3.12. <br>πŸ‘€ **Monitor**: Feishu reaction events in groups. <br>βš™οΈ **Config**: Verify `chat_type` is always present in payloads.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. <br>πŸ”§ **Patch**: Upgrade to **2026.3.12** or later. <br>πŸ“… **Date**: Published 2026-03-29.

Q9What if no patch? (Workaround)

πŸ›‘ **Workaround**: Enforce strict input validation. <br>🚫 **Block**: Reject events missing `chat_type`. <br>πŸ”’ **Policy**: Manually enforce `requireMention` if possible.

Q10Is it urgent? (Priority Suggestion)

🚨 **Urgency**: **CRITICAL**. <br>πŸ”₯ **Priority**: Patch Immediately. <br>πŸ“ˆ **CVSS**: 9.8 (Critical). <br>⏳ **Time**: Zero-day risk due to low exploit complexity.