Impact
OpenClaw versions prior to 2026.3.25 contain an improper access control flaw in the /sessions/:sessionKey/kill endpoint. The API allows any bearer‑authenticated user to invoke the killSubagentRunAdmin function without checking proper scope, which means an attacker can terminate any subagent session. This flaw, classified as CWE‑863, can lead to loss of service for the targeted subagents and allows an attacker to disrupt processes or deny access to legitimate users.
Affected Systems
The vulnerability affects installations of the OpenClaw application built on Node.js when the version is earlier than 2026.3.25. Any deployment using these versions is susceptible and can be compromised by sending authenticated HTTP requests to the /sessions/:sessionKey/kill route.
Risk and Exploitability
The CVSS score of 7.2 indicates a high severity. The EPSS score is not available and the flaw is not listed in the CISA KEV catalog, suggesting it has not yet been widely exploited. The likely attack vector is any bearer‑authenticated user sending HTTP requests to the affected endpoint; no additional privileges are required beyond API authentication. Successful exploitation results in arbitrary session termination, enabling denial of service or disruption of subagent functionality.
OpenCVE Enrichment