Impact
OpenClaw before 2026.3.11 contains an authorization bypass in the gateway agent RPC that allows an authenticated operator with operator.write permission to supply attacker‑controlled spawnedBy and workspaceDir values. This override removes the intended workspace boundary; the operator can read, write, or execute files from any directory that the process can access, effectively breaking confidentiality, integrity, and availability of the host.
Affected Systems
The vulnerability affects OpenClaw deployments running any Node.js environment that use the OpenClaw gateway agent prior to version 2026.3.11. All earlier 2026.3.x releases are impacted and require an update.
Risk and Exploitability
With a CVSS score of 8.7 the flaw is considered high severity. EPSS data is not available, but the issue is remotely exploitable by anyone who can authenticate as an operator with write rights, a privilege typically given to trusted administrators. The attack does not require local code execution and relies solely on crafted RPC parameters. Although the vulnerability is not currently listed in CISA’s KEV catalog, its impact is significant for environments that rely on strict workspace confinement.
OpenCVE Enrichment