#VU125209 Authentication bypass using an alternate path or channel in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to reach callback handling without DM pairing.
The vulnerability exists due to authentication bypass using an alternate path or channel in the Feishu raw card send surface when processing legacy callback payloads. A remote user can send a specially crafted raw card command payload to reach callback handling without DM pairing.
Unpaired recipients can reach the legacy callback path.