Description
OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing authenticated operators with only operator.write permission to access admin-only browser profile management routes through browser.request. Attackers can create or modify browser profiles and persist attacker-controlled remote CDP endpoints to disk without holding operator.admin privileges.
Published: 2026-03-29
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch Upgrade
AI Analysis

Impact

OpenClaw versions prior to 2026.3.11 contain a mis‑authorization flaw that allows operators with only write permissions to call browser‑profile‑management routes that are normally restricted to administrators. By sending requests through the browser.request interface, an attacker can create new browser profiles or modify existing ones and persist custom CDP (Chrome DevTools Protocol) endpoints to disk. This unauthorized configuration change can tamper with browser behavior and potentially expose the system to further exploitation, but the CVE description does not claim remote code execution. The underlying weakness is a classic authorization bypass (CWE‑863).

Affected Systems

Any installation of OpenClaw distributed by OpenClaw running a version older than 2026.3.11 is affected. No finer granularity of impacted releases is specified beyond the cutoff.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity impact. The vulnerability requires no special conditions beyond an authenticated operator with write access, so insiders or compromised operator accounts can exploit it. EPSS data is not provided and the vulnerability is not yet listed in the CISA KEV catalog. The likely attack vector is through the web API, specifically by crafting HTTP requests sent via the browser.request endpoint; this inference is drawn from the CVE description, which states that attackers can issue such requests. Because the flaw is an authentication bypass, exploitation is relatively user‑friendly once an authorized session exists.

Generated by OpenCVE AI on March 29, 2026 at 15:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.3.11 or later
  • If an update is not immediately possible, remove or revoke operator.write permissions for accounts that should not access admin-only browser‑profile routes
  • Consider restricting or disabling the browser.request endpoint for non‑admin users
  • Monitor logs for unexpected profile creation or CDP endpoint changes to detect abuse

Generated by OpenCVE AI on March 29, 2026 at 15:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 29 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing authenticated operators with only operator.write permission to access admin-only browser profile management routes through browser.request. Attackers can create or modify browser profiles and persist attacker-controlled remote CDP endpoints to disk without holding operator.admin privileges.
Title OpenClaw < 2026.3.11 - Authorization Bypass in Browser Profile Management via browser.request
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-30T16:03:29.065Z

Reserved: 2026-03-17T11:31:33.584Z

Link: CVE-2026-32972

cve-icon Vulnrichment

Updated: 2026-03-30T16:03:25.246Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-29T13:17:01.167

Modified: 2026-03-31T17:55:59.400

Link: CVE-2026-32972

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T06:58:21Z

Weaknesses