<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Matrix — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/matrix/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 20:16:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/matrix/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Authorization Bypass Vulnerability (CVE-2026-44110)</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-auth-bypass/</link><pubDate>Wed, 06 May 2026 20:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-auth-bypass/</guid><description>OpenClaw before 2026.4.15 contains an authorization bypass vulnerability that allows attackers with DM-paired sender IDs to execute room control commands without being in configured allowlists, potentially enabling privileged OpenClaw behavior by posting in bot rooms.</description><content:encoded><![CDATA[<p>OpenClaw, a Matrix bot, is vulnerable to an authorization bypass (CVE-2026-44110) affecting versions prior to 2026.4.15. This vulnerability stems from the Matrix room control-command authorization logic trusting DM pairing-store entries without proper validation against configured allowlists. An attacker who has established a DM pairing with the bot can exploit this flaw to execute room control commands by posting in bot rooms, even if they are not explicitly authorized. This can lead to unauthorized modification of room settings or execution of other privileged bot functionalities. The vulnerability was reported by VulnCheck and patched in version 2026.4.15. Defenders should upgrade to the latest version of OpenClaw to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker establishes a direct message (DM) pairing with the OpenClaw bot.</li>
<li>The bot stores the DM pairing information.</li>
<li>Attacker identifies a bot room where OpenClaw is active.</li>
<li>Attacker crafts a room control command, such as a command to change room settings.</li>
<li>Attacker posts the malicious command within the bot room.</li>
<li>OpenClaw receives the command and incorrectly trusts the DM pairing-store entry for authorization.</li>
<li>OpenClaw executes the room control command with elevated privileges, bypassing configured allowlists.</li>
<li>The attacker successfully modifies the room settings or triggers other privileged behavior.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44110 allows unauthorized users to execute privileged commands within Matrix rooms controlled by OpenClaw. This could result in significant disruption, including unauthorized modification of room settings, disclosure of sensitive information, or other malicious activities enabled by OpenClaw&rsquo;s functionality. The severity is compounded by the ease of exploitation, requiring only a pre-existing DM pairing with the bot. The impact depends on the specific functionalities and permissions granted to the OpenClaw bot within the affected Matrix environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.15 or later to patch CVE-2026-44110 (see References).</li>
<li>Review and restrict the permissions granted to the OpenClaw bot within Matrix rooms to minimize potential impact from unauthorized command execution.</li>
<li>Implement the Sigma rule &ldquo;Detect OpenClaw Room Control Command Abuse&rdquo; to identify suspicious command activity within bot rooms.</li>
<li>Monitor Matrix room activity logs for unauthorized modifications or actions performed by the OpenClaw bot.</li>
<li>Enable logging of Matrix bot commands to aid in investigation and auditing of potential authorization bypass attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization bypass</category><category>matrix</category><category>bot</category></item></channel></rss>