send
90 known vulnerabilities · 2 critical · 1 high
send vulnerable to template injection that can lead to XSS
Malicious code in ampersend-mymove (npm)
OpenClaw's commands.allowFrom sender authorization accepted conversation identifiers via ctx.From
OpenClaw's Zalo group sender allowlist bypass permits unauthorized GROUP dispatch
OpenClaw: Gateway operator.write Can Reach Admin-Class Telegram Config and Cron Persistence via send
OpenClaw: Zalo replay dedupe keys could suppress messages across chats or senders
OpenClaw: Mattermost callback dispatch allowed non-allowlisted sender actions
OpenClaw: Gateway operator.write Can Reach Admin-Class Talk Voice Config Persistence via chat.send
OpenClaw: Slack system events bypass sender authorization in member and message subtype handlers
Websites were able to send any requests to the development server and read the response in vite
OpenClaw's typed sender-key matching for toolsBySender prevents identity-collision policy bypass
OpenClaw: Slack interactive callbacks could skip configured sender checks in some shared-workspace flows
Leaking of user information on Cross-Domain communication in sysend
OpenClaw: MSTeams thread history bypasses sender allowlist via Graph API
Duplicate Advisory: OpenClaw: Slack system events bypass sender authorization in member and message subtype handlers
OpenClaw Gateway `operator.write` can reach admin-only session reset via `chat.send` `/reset`
OpenClaw: Telegram audio preflight transcription enables resource consumption by unauthorized senders
OpenClaw: `operator.write` chat.send could reach admin-only config writes
OpenClaw: Gateway `operator.write` can reach admin-only persisted `verboseLevel` via `chat.send` `/verbose`
Parse Server OAuth2 adapter app ID validation sends wrong token to introspection endpoint
OpenClaw: Gateway operator.write Can Reach Admin-Class Channel Allowlist Persistence via chat.send
OpenClaw: Gateway chat.send ACP-only provenance guard could be bypassed by client identity spoofing
OpenClaw has two SSRF via sendMediaFeishu and markdown image fetching in Feishu extension
OpenClaw: Feishu thread history and quoted messages bypass sender allowlist
Malicious code in firestore-messagebird-send-msg (npm)
OpenClaw: Non-owner command-authorized sender can change the owner-only `/send` session delivery policy
Eugeny Tabby Sends Password Despite Host Key Verification Failure
Malicious code in sendapp (npm)
Paperclip: codex_local inherited ChatGPT/OpenAI-connected Gmail and was able to send real email
OpenClaw has an unauthorized sender bypass in its stop triggers and /models command authorization
Malicious code in sendgram (npm)
OpenClaw: Sender policy bypass in host media attachment reads allows unauthorized local file disclosure
OpenClaw: Google Chat and Zalouser group sender allowlist bypass via policy downgrade
Malicious code in send-orchestrator-event-lambda (npm)
OpenClaw: Collect-mode queue batches could reuse the last sender authorization context
Malicious code in @clausehq/flows-step-sendgridemail (npm)
OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension
Malicious code in ampersend-client (npm)
Malicious code in disc-web-sender (npm)
Malicious code in sendbird-hubs (npm)
Malicious code in sendbird-uikit-integration (npm)
Malicious code in com.sendbird.chat (npm)
OpenClaw's elevated allowFrom accepted broader identity signals than specified within sender-scoped authorization
Malicious code in sendbird_chat_sdk (npm)
OpenClaw: Zalo channel downloads media before sender authorization
OpenClaw: Heartbeat context inheritance bypasses sandbox via senderIsOwner escalation
Duplicate Advisory: OpenClaw's Slack reaction/pin sender-policy consistency issue in non-message ingress
OpenClaw leaf subagents can bypass controlScope restrictions to send messages to child sessions
OpenClaw authorization bypass: operator.write can resolve exec approvals via chat.send -> /approve
OpenClaw: Unauthorized Telegram Senders Trigger Media Download and Disk Write Before Access Check
OpenClaw: Microsoft Teams SSO invoke handler missed sender authorization checks
Fastify Vulnerable to DoS via Unbounded Memory Allocation in sendWebStream
OpenClaw: Cross-account sender authorization expansion in `/allowlist ... --store` account scoping
OpenClaw Slack: dmPolicy=open allowed any DM sender to run privileged slash commands
OpenClaw's Slack reaction/pin sender-policy consistency issue in non-message ingress
Malicious code in sendtelegram (npm)
OpenClaw: Feishu Raw Card Send Surface Can Mint Legacy Card Callbacks That Bypass DM Pairing
Malicious code in @posthog/sendgrid-plugin (npm)
esbuild enables any website to send any requests to the development server and read the response
Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true`
OpenClaw Google Chat spoofing access with allowlist authorized mutable email principal despite sender-ID mismatch
Parse Server email verification resend page leaks user existence
Malicious code in sendmoneyserv (npm)
Malicious code in spotify-event-sender (npm)
Malicious code in pascoresend (npm)
OpenClaw's MS Teams sender allowlist bypass when route allowlist is configured and sender allowlist is empty
OpenClaw: MS Teams Feedback Invocation Bypasses Sender Allowlists and Records Unauthorized Session Feedback
NextAuth.js before 4.10.3 and 3.29.10 sending verification requests (magic link) to unwanted emails
OpenClaw Discord moderation authorization used untrusted sender identity in tool-driven flows
Malicious code in sendbird-chat-sample-react (npm)
Malicious code in sendbird-moderation-dashboard (npm)
Malicious code in gh-action-send-event (npm)
Malicious code in firefox-send (npm)
Malicious code in com.sendbird.calls (npm)
Malicious code in reqsender321 (npm)
Malicious code in sendbird-uikit-gpt (npm)
Duplicate Advisory: OpenClaw: Nostr inbound DMs could trigger unauthenticated crypto work before sender policy enforcement
Malicious code in wm-logzio-sender (npm)
Malicious code in dowload_ebok_verrassend_aanzoek_by_andie_brock_4mly7 (npm)
Malicious code in yandex-sendlinksms (npm)
Malicious code in eipsend (npm)
OpenClaw: Matrix thread root and reply context bypass sender allowlist
OpenClaw: Nostr inbound DMs could trigger unauthenticated crypto work before sender policy enforcement
Duplicate Advisory: OpenClaw's MS Teams sender allowlist bypass when route allowlist is configured and sender allowlist is empty
Malicious code in multichannelsender (npm)
Malicious code in sendinblue2019 (npm)