CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-PW7H-9G6P-C378
7.5

GHSA-pw7h-9g6p-c378: Authorization Bypass and Resource Exhaustion in OpenClaw Tlon Provider

Amit Schendel
Amit Schendel
Senior Security Researcher

Mar 26, 2026·6 min read·5 visits

No Known Exploit

Executive Summary (TL;DR)

A logic error in OpenClaw's Tlon extension prevents the revocation of access permissions via empty allowlists, and a design flaw permits unauthenticated users to trigger expensive network and processing tasks.

The OpenClaw Tlon provider extension contains two logic flaws leading to authorization bypass and uncontrolled resource consumption. A falsy evaluation of array lengths prevents the application of empty allowlists, while improper operation ordering allows unauthenticated users to trigger expensive citation processing.

Vulnerability Overview

The OpenClaw agentic framework utilizes the monitorTlonProvider extension to handle communications and configuration settings for Urbit-based agents. This extension manages message parsing and maintains the authorization state via a direct message allowlist. Two distinct vulnerabilities exist within this component: an authorization bypass and an uncontrolled resource consumption condition.

The authorization bypass occurs due to a logic error in the settings reconciliation routine. When an administrator attempts to revoke all access by supplying an empty allowlist, the system misinterprets the input. This results in the retention of previously cached, permissive authorization states rather than applying the restrictive policy.

The resource exhaustion vulnerability stems from an insecure order of operations during message processing. The system resolves computationally and network-intensive message citations before validating the sender's authorization or verifying if the bot was mentioned. This allows external actors to invoke expensive operations repeatedly.

These flaws correspond to CWE-863 (Incorrect Authorization) and CWE-400 (Uncontrolled Resource Consumption). The combination permits unauthenticated threat actors to degrade system performance and enables previously authorized users to maintain unauthorized access after formal revocation.

Root Cause Analysis

The authorization bypass relies on a type coercion flaw regarding JavaScript array evaluation. The application checks the length property of the dmAllowlist array to determine if a new policy should be applied to the active configuration. Since an empty array [] has a length of 0, the expression evaluates to a falsy value.

Consequently, the conditional check if (currentSettings.dmAllowlist?.length) fails when a user explicitly submits an empty list to block all incoming communications. The system interprets this intentional revocation as a missing or unset configuration object. The application then falls back to the previous effectiveDmAllowlist, failing to implement the requested access restrictions.

The resource consumption issue is a structural flaw in the message ingestion pipeline. The application processes incoming payloads by extracting and expanding citations via the resolveAllCites function. This resolution step occurs entirely prior to the execution of authentication checks or bot-mention filters.

Because citation resolution involves fetching external or linked Urbit resources, it requires non-trivial computation and network activity. Processing these elements before applying filtering criteria permits unauthenticated message senders to force the bot to execute expensive operations at scale, bypassing the intended security boundaries.

Code Analysis and Patch Walkthrough

Commit 3cbf932413e41d1836cb91aed1541a28a3122f93 resolves both logic flaws within the Tlon provider. The primary fix addresses the falsy evaluation of the allowlist array by replacing the length check with a strict inequality comparison against undefined.

The patched code explicitly validates the presence of the array object rather than its element count. This ensures that an empty array [] correctly passes the condition and securely updates the effectiveDmAllowlist state.

// Vulnerable Code
if (currentSettings.dmAllowlist?.length) {
  effectiveDmAllowlist = currentSettings.dmAllowlist;
}
 
// Patched Code
if (currentSettings.dmAllowlist !== undefined) {
  effectiveDmAllowlist = currentSettings.dmAllowlist;
}

For the resource consumption flaw, the patch reorders the operation pipeline. The system now parses the raw text and validates bot mentions and authorization status before invoking resolveAllCites. This prevents the processing of expensive citations for unauthorized or irrelevant messages.

Exploitation Methodology

Exploitation of the authorization bypass requires a specific sequence of administrative actions. An administrator must configure an initial allowlist containing one or more authorized entities. Subsequently, the administrator must attempt to lock down the bot by submitting an empty allowlist configuration payload.

Once the empty list is submitted, the application silently fails to update the active policy due to the falsy length check. Entities present on the previous allowlist retain full access to the bot's functionality. The administrator receives no explicit error indicating that the revocation operation failed.

Exploiting the resource exhaustion vulnerability requires no prior authorization or specific configuration state. An unauthenticated attacker crafts a high volume of messages containing deeply nested or numerous external citations. The attacker sends these messages concurrently to the target OpenClaw instance via the Tlon provider.

The application processes each incoming message and executes resolveAllCites on the embedded links. The resulting network requests and memory allocation consume host resources, degrading the performance of the agentic framework before the messages are eventually discarded by the subsequent authorization checks.

Impact and Secondary Risks

The authorization bypass allows previously trusted users to maintain persistent access to the OpenClaw agent after their permissions are revoked. If the bot exposes administrative commands or sensitive data querying capabilities, the stale authorization policy permits unauthorized execution of these critical functions.

The pre-authorization resource consumption flaw provides a reliable vector for denial-of-service conditions. By flooding the bot with complex citation payloads, an attacker forces the application to exhaust available memory or network bandwidth, preventing legitimate users from interacting with the system.

The implemented patch relies on strict undefined checks. If the settings data store permits the injection of null values, the condition currentSettings.dmAllowlist !== undefined evaluates to true. Subsequent operations on the allowlist, such as array iteration or joining, will trigger a TypeError and crash the application process.

Additionally, the settings reconciliation logic operates within an in-memory loop. High-frequency updates to the settings store create race conditions. If the reconciliation loop is interrupted or fails to process concurrent changes atomically, the system may apply inconsistent or partial security policies.

Remediation and Mitigation

System administrators must update the OpenClaw framework to a version containing commit 3cbf932413e41d1836cb91aed1541a28a3122f93. Applying the patch replaces the flawed logic checks and securely reorders the message processing pipeline to prevent unauthenticated resource consumption.

If immediate patching is not feasible, administrators can mitigate the authorization bypass by adding a dummy or non-existent user to the allowlist instead of submitting an empty array. This provides an array with a length of 1, passing the vulnerable conditional check while effectively revoking access for previously authorized users.

Mitigating the resource consumption vulnerability without patching requires upstream network filtering. Administrators should deploy rate-limiting rules on the network interface receiving Urbit messages to throttle high-volume message floods before they reach the OpenClaw application payload parser.

Security teams should audit the application configuration data stores to ensure that null values cannot be injected into the dmAllowlist field. Implementing rigorous schema validation on the settings object prevents the runtime errors associated with the secondary type coercion risks identified in the patch analysis.

Fix Analysis (1)

Technical Appendix

CVSS Score
7.5/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Systems

OpenClawOpenClaw extensions/tlon

Affected Versions Detail

Product
Affected Versions
Fixed Version
OpenClaw extensions/tlon
OpenClaw
< patched versionCommit 3cbf932413e41d1836cb91aed1541a28a3122f93
AttributeDetail
CWE IDCWE-863, CWE-400
Attack VectorNetwork
Authentication RequiredNone (for resource exhaustion)
ImpactAuthorization Bypass, Denial of Service
Exploit StatusNone documented
Fix Commit3cbf932413e41d1836cb91aed1541a28a3122f93

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1499Endpoint Denial of Service
Impact
CWE-863
Incorrect Authorization

The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.

References & Sources

  • [1]GitHub Advisory: GHSA-pw7h-9g6p-c378
  • [2]Fix Commit in OpenClaw Repository
  • [3]OpenClaw Repository

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.