/ data / vuln_en / openclaw / GHSA-fqrj-m88p-qf3v.yaml
GHSA-fqrj-m88p-qf3v.yaml
 1  info:
 2    name: OpenClaw
 3    cve: GHSA-fqrj-m88p-qf3v
 4    summary: OpenClaw Zalo replay dedupe cache could suppress events across authenticated webhook targets
 5    details: >-
 6      Summary
 7  
 8  
 9      Before OpenClaw 2026.3.31, the Zalo webhook replay-dedupe cache was shared across authenticated webhook targets and keyed
10      too broadly. In multi-account deployments, a replay seen on one account could suppress a legitimate event on another account
11      if event_name and message_id matched.
12  
13  
14      Impact
15  
16  
17      An attacker who controlled one authenticated Zalo webhook path in a multi-account gateway deployment could cause silent
18      message suppression on a different Zalo account sharing that gateway. This was an availability issue; it did not provide
19      cross-account authentication or data access.
20  
21  
22      Affected Packages / Versions
23  
24  
25      - Package: openclaw (npm)
26  
27      - Affected versions: >= 2026.2.19, < 2026.3.31
28  
29      - Patched versions: >= 2026.3.31
30  
31      - Latest published npm version: 2026.4.1
32    cvss: ''
33    severity: LOW
34    security_advise: Upgrade openclaw to >= 2026.3.31 or later. Commit(s) - 4d038bb242c11f39e45f6a4bde400e5fd42e4ebf — scope
35      webhook replay dedupe per target - 7cea7c29705b188b464cc9cdc107c275b94b2a72 — follow-up hardening to scope replay dedupe
36      by path and account
37    references:
38    - https://github.com/openclaw/openclaw/security/advisories/GHSA-fqrj-m88p-qf3v
39  rule: version < "2026.3.31"
40  references:
41  - https://github.com/openclaw/openclaw/security/advisories/GHSA-fqrj-m88p-qf3v