Mar 4, 2026·5 min read·1 visit
The OpenClaw BlueBubbles plugin fails to enforce access controls when the allowed sender list is empty. Due to a 'fail-open' logic error in the underlying SDK, unconfigured instances accept DMs from any source, granting full interaction with the AI assistant.
A critical access control vulnerability exists in the OpenClaw BlueBubbles plugin due to a logic error in the shared authorization utility. The flaw causes the system to fail-open when the allowlist configuration is empty, permitting unauthorized remote users to bypass Direct Message (DM) gating policies. This allows arbitrary unauthenticated users to interact with the AI assistant, potentially triggering sensitive actions or accessing private data.
The vulnerability resides in the plugin-sdk component of OpenClaw, specifically within the authorization logic used by the BlueBubbles optional channel extension. OpenClaw is a personal AI assistant infrastructure that aggregates communications from various platforms. The BlueBubbles plugin integrates iMessage and SMS capabilities, allowing the assistant to process and respond to messages.
The core issue is an Incorrect Authorization (CWE-863) flaw where the system defaults to an authorized state when no access policies are defined. In a secure configuration, an empty allowlist should result in all traffic being denied until explicitly permitted. However, the vulnerable implementation treated an empty list as a directive to allow all traffic, bypassing the intended pairing or allowlist security modes.
This flaw is particularly critical because pairing is often the default secure mode for new installations. Administrators expecting a 'deny-by-default' posture until devices are paired are instead left exposed to a 'permit-all' state, allowing any actor capable of routing a message to the BlueBubbles instance to interact with the AI agent.
The root cause is a logic error in the isAllowedParsedChatSender utility function located in src/plugin-sdk/allow-from.ts. This function is responsible for validating whether an incoming message sender is authorized based on the user's configuration.
The function accepts a list of allowed senders (allowFrom). The logic was intended to support a wildcard (*) for public access, but the implementation checked the length of the array to determine the default behavior. Specifically, the code contained a conditional check: if (allowFrom.length === 0). If this condition was met—meaning the user had not yet added any trusted contacts—the function returned true.
This effectively inverted the security model. Instead of failing closed (denying access when no rules exist), the system failed open. The BlueBubbles plugin relies on this boolean return value to gate access to the processMessage and processReaction workflows. Consequently, an uninitialized configuration resulted in the complete bypass of authentication checks.
The following analysis compares the vulnerable code path with the patched version in src/plugin-sdk/allow-from.ts. The fix involves inverting the return value for empty lists and requiring an explicit wildcard for open access.
Vulnerable Implementation:
export function isAllowedParsedChatSender(params: AllowedParsedChatSenderParams) {
const allowFrom = params.allowFrom.map((entry) => String(entry).trim());
// VULNERABILITY: If the list is empty, return TRUE (Allow all)
if (allowFrom.length === 0) {
return true;
}
// ... checks for specific sender ID ...
}Patched Implementation (Commit 9632b9b):
export function isAllowedParsedChatSender(params: AllowedParsedChatSenderParams) {
const allowFrom = params.allowFrom.map((entry) => String(entry).trim());
// FIX: Fail-closed. If the list is empty, return FALSE (Deny all)
if (allowFrom.length === 0) {
return false;
}
// Explicitly require wildcard for allow-all behavior
if (allowFrom.includes("*")) {
return true;
}
// ... checks for specific sender ID ...
}The patch ensures that an empty configuration results in a secure state. Additionally, logic was unified in resolveDmGroupAccessDecision to prevent similar drift in reaction processing.
Exploiting this vulnerability requires no specialized tools or authentication. The attacker simply needs to identify a target OpenClaw instance running the BlueBubbles plugin that has not yet been configured with specific trusted peers.
isAllowedParsedChatSender.allowFrom list, the function returns true.The vulnerability also extends to reactions (Tapbacks), allowing an attacker to trigger event-driven workflows simply by reacting to a message history.
The impact of this vulnerability is critical due to the capabilities typically granted to personal AI assistants.
The CVSS score is estimated at 9.8 (Critical) because the attack vector is network-based (via the messaging platform), requires no privileges, requires no user interaction, and results in a total compromise of the confidentiality and integrity of the AI agent's operations.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
OpenClaw OpenClaw | < Feb 22, 2026 | commit 9632b9b |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-863 |
| Attack Vector | Network |
| CVSS | 9.8 (Critical) |
| Impact | Authorization Bypass |
| Exploit Status | PoC Available |
| Fix Complexity | Low (Logic Update) |
The software does not provide sufficient authorization for an actor to access a resource or perform an action, or it incorrectly validates the authorization.