NVD Vulnerability Detail
Search Exploit, PoC
CVE-2026-35635
Summary

OpenClaw before 2026.3.22 contains a webhook path route replacement vulnerability in the Synology Chat extension that allows attackers to collapse multi-account configurations onto shared webhook paths. Attackers can exploit inherited or duplicate webhook paths to bypass per-account DM access control policies and replace route ownership across accounts.

Publication Date April 10, 2026, 7:16 a.m.
Registration Date April 15, 2026, 11:35 a.m.
Last Update April 16, 2026, 2 a.m.
CVSS3.1 : MEDIUM
スコア 6.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A) なし
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* 2026.3.22
Related information, measures and tools
Common Vulnerabilities List