OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities
Moderate severity
GitHub Reviewed
Published
Feb 15, 2026
in
openclaw/openclaw
•
Updated Feb 20, 2026
Description
Published to the GitHub Advisory Database
Feb 18, 2026
Reviewed
Feb 18, 2026
Published by the National Vulnerability Database
Feb 20, 2026
Last updated
Feb 20, 2026
Summary
Under iMessage
groupPolicy=allowlist, group authorization could be satisfied by sender identities coming from the DM pairing store, broadening DM trust into group contexts.Details
Affected component:
src/imessage/monitor/monitor-provider.ts.Vulnerable logic derived
effectiveGroupAllowFromusing both the static group allowlist and DM pairing-store identities (storeAllowFrom). This allowed a sender approved via DM pairing to satisfy group authorization in groups even if the sender/chat was not explicitly present ingroupAllowFrom.This weakens boundary separation between DM pairing and group allowlist authorization.
Affected Packages / Versions
openclaw(npm): affected<= 2026.2.13clawdbot(npm): affected<= 2026.1.24-3Fix Commit(s)
openclaw/openclaw@872079d42fe105ece2900a1dd6ab321b92da2d59openclaw/openclaw@90d1e9cd71419168b2faa54a759b124a3eacfae7Thanks @vincentkoc for reporting.
References