Impact
OpenClaw versions prior to 2026.3.11 contain an authorization bypass that permits callers with operator.write scope to trigger admin‑only session reset logic through agent slash commands. By issuing /new or /reset commands, an attacker can reset targeted conversation state without possessing operator.admin privileges. This flaw allows uncontrolled disruption of session data, potentially affecting continuity and integrity of user interactions, but does not provide arbitrary code execution or direct data exfiltration.
Affected Systems
The vulnerability affects the OpenClaw platform, specifically all releases before version 2026.3.11. Clients running any version earlier than 2026.3.11, regardless of node.js environment, are susceptible.
Risk and Exploitability
The CVSS score of 6.9 classifies this flaw as medium severity. No EPSS score is available, and it is not listed in the CISA KEV catalog, suggesting limited known exploitation. Attackers require access to operator.write privileges, which may be granted to agents or services, and can exploit the flaw by sending a slash command request; thus the attack vector is remote via authenticated API calls. Patching mitigates the risk entirely.
OpenCVE Enrichment