Impact
The vulnerability inconsistently enforces gateway client scopes for the /allowlist command, allowing any client with operator.write scope to modify authorization policies through the chat.send command. This flaw enables attackers to persist changes to allowFrom and groupAllowFrom settings that are normally restricted to operator.admin, effectively elevating their privileges within the system.
Affected Systems
OpenClaw software versions earlier than 2026.3.24 are affected. The product runs on a Node.js environment and is identified in the CVE as missing authorization checks (CWE‑862).
Risk and Exploitability
The CVSS score of 7.1 indicates a high severity. No EPSS data is available, but the requirement for an authenticated operator.write client and the ability to modify persistent channel policies suggest a nontrivial exploitation risk. The vulnerability is currently not listed in the CISA KEV catalog, yet administrators should treat it with priority and apply the recommended patch to mitigate potential privilege escalation.
OpenCVE Enrichment
Github GHSA