Impact
OpenClaw before version 2026.3.22 fails to enforce the operator.admin scope on mutating internal ACP chat commands, allowing users without administrative rights to execute control‑plane modifications. This missing authorization check corresponds to CWE‑862. The resulting ability to change system state without proper privileges can lead to unauthorized configuration changes, service disruptions, or further exploitation within the application.
Affected Systems
The vulnerability affects the OpenClaw product distributed as OpenClaw:OpenClaw versions earlier than 2026.3.22, operating on a Node.js environment. No other vendors or product variants are listed in the CNA data.
Risk and Exploitability
The CVSS base score of 7.1 indicates a moderate‑to‑high severity of this flaw. EPSS information is unavailable and the vulnerability is not listed in the CISA KEV catalog, suggesting it is not known to be actively exploited. Attackers must be able to invoke the affected ACP chat commands, which can be done by any user who has access to the internal chat interface—this is inferred from the advisory description. Once such access is available, the lack of scope enforcement allows immediate privilege escalation, making exploitation straightforward. The overall risk remains significant until the patch is applied.
OpenCVE Enrichment