Impact
OpenClaw implementations prior to version 2026.3.24 lack a proper authorization check on the HTTP "/v1/models" endpoint, allowing users with only the operator.approvals scope to enumerate gateway model metadata. This bypass defeats the stricter WebSocket RPC authorization controls and grants unintended read access to sensitive model information. The weakness aligns with missing authorization checks (CWE-863).
Affected Systems
The affected product is OpenClaw, any installation older than 2026.3.24, typically running under a Node.js runtime as indicated by the CPE string.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity; however, the EPSS score is not available, so the probability of exploitation remains unknown. The vulnerability is not catalogued in CISA’s KEV list, suggesting no currently documented exploitation. Attackers can exploit the flaw remotely via the HTTP API, bypassing WebSocket checks, and can disclose model metadata if they possess the limited operator.approvals scope.
OpenCVE Enrichment
Github GHSA