Impact
The vulnerability in OpenClaw allows users with operator.write scope to change the session’s sendPolicy and modify allowlist entries without the required operator.admin authority. By calling the /send command with on|off|inherit the attacker can persistently alter the delivery policy that is normally reserved for owners, and by invoking /allowlist add they can add arbitrary IP and pairing‑store allowlist entries. These changes compromise the integrity of the chat system’s access controls and can lead to unintended data routing, service disruption, or exposure of restricted content.
Affected Systems
OpenClaw implementations running any version before 2026.3.24 are affected. The issue exists in the OpenClaw server component that processes /send and /allowlist chat commands on Node.js based deployments.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity vulnerability, and the lack of EPSS data makes it unclear how frequently the vulnerability is being exploited. Since the attack vector involves chat command usage by users with operator.write scope, it is inferred that an attacker must already have some level of write access to the system. The vulnerability is not listed in the CISA KEV catalog, but the ability to change fundamental configuration settings is considered a serious operational risk for deployments that rely on strict access control for sendPolicy and allowlist entries.
OpenCVE Enrichment
Github GHSA