OpenClaw: Google Chat and Zalouser group sender allowlist bypass via policy downgrade
Description
Published by the National Vulnerability Database
Mar 31, 2026
Published to the GitHub Advisory Database
Apr 1, 2026
Reviewed
Apr 1, 2026
Last updated
Apr 1, 2026
Summary
When only a route-level group allowlist was configured, sender policy resolution silently downgraded from
allowlisttoopeninstead of preserving the configured group policy.Impact
Any member of an allowlisted Google Chat space or Zalouser group could interact with the bot even when the operator intended sender-level restrictions.
Affected Component
extensions/googlechat/src/monitor-access.ts, extensions/zalouser/src/monitor.tsFixed Versions
<= 2026.3.24>= 2026.3.282026.3.28contains the fix.Fix
Fixed by commit
e64a881ae0(Channels: preserve routed group policy).References