CVE-2026-35635
Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
09/04/2026
Last modified:
09/04/2026
Description
OpenClaw before 2026.3.22 contains a webhook path route replacement vulnerability in the Synology Chat extension that allows attackers to collapse multi-account configurations onto shared webhook paths. Attackers can exploit inherited or duplicate webhook paths to bypass per-account DM access control policies and replace route ownership across accounts.
Impact
Base Score 4.0
6.30
Severity 4.0
MEDIUM
Base Score 3.x
4.80
Severity 3.x
MEDIUM
References to Advisories, Solutions, and Tools
- https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87
- https://github.com/openclaw/openclaw/commit/980940aa58f862da4e19372597bbc2a9f268d70b
- https://github.com/openclaw/openclaw/security/advisories/GHSA-rqp8-q22p-5j9q
- https://www.vulncheck.com/advisories/openclaw-webhook-path-route-replacement-vulnerability-in-synology-chat



