Duplicate Advisory: Synology Chat dmPolicy=allowlist failed open on empty allowedUserIds, allowing unauthorized agent dispatch
High severity
GitHub Reviewed
Published
Mar 19, 2026
to the GitHub Advisory Database
•
Updated Mar 20, 2026
Withdrawn
This advisory was withdrawn on Mar 20, 2026
Description
Published by the National Vulnerability Database
Mar 19, 2026
Published to the GitHub Advisory Database
Mar 19, 2026
Reviewed
Mar 20, 2026
Withdrawn
Mar 20, 2026
Last updated
Mar 20, 2026
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-gw85-xp4q-5gp9. This link is maintained to preserve external references.
Original Description
OpenClaw versions 2026.2.22 and 2026.2.23 contain an authorization bypass vulnerability in the synology-chat channel plugin where dmPolicy set to allowlist with empty allowedUserIds fails open. Attackers with Synology sender access can bypass authorization checks and trigger unauthorized agent dispatch and downstream tool actions.
References