Impact
OpenClaw versions before 2026.3.11 have a flaw in the session_status tool that lets a sandboxed subagent provide an arbitrary sessionKey and read or modify data that belongs to another session. This bypasses the intended sandbox boundary and can change persisted model overrides. The weakness is a failure to enforce proper access control for session data (CWE‑863).
Affected Systems
All installations of OpenClaw built on Node.js that use the session_status tool and are running a version older than 2026.3.11 are affected. Versions 2026.3.11 and newer are not impacted.
Risk and Exploitability
This vulnerability has a CVSS score of 9.2, classifying it as critical. The EPSS score is not available, and it is not listed in the CISA KEV catalog. The attack vector is likely local on systems where an attacker can execute the session_status tool, but if the tool is exposed over a network interface remote exploitation is possible. Successful use of arbitrary session keys can lead to unauthorized data access or modification, compromising confidentiality and integrity of session state.
OpenCVE Enrichment