← Voltar para CVEs
CVE-2026-41365
MEDIUM5.4
Descricao
OpenClaw before 2026.3.31 contains a sender allowlist bypass vulnerability in MS Teams thread history fetched via Graph API. Attackers can retrieve thread messages that should be filtered by sender allowlists, bypassing message filtering restrictions.
Detalhes CVE
Pontuacao CVSS v3.15.4
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado4/28/2026
Ultima modificacao4/28/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
openclaw:openclaw
Fraquezas (CWE)
CWE-441
Referencias
https://github.com/openclaw/openclaw/commit/5cca38084074fb5095aa11b6a59820d63e4937c9(disclosure@vulncheck.com)
https://github.com/openclaw/openclaw/security/advisories/GHSA-chfm-xgc4-47rj(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/openclaw-sender-allowlist-bypass-via-graph-api-thread-history(disclosure@vulncheck.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.