Impact
The vulnerability in OpenClaw occurs when the session_status component resolves a sessionId to its canonical session key before applying visibility checks. This allows a sandboxed child session to read data from parent or sibling sessions that should be restricted by explicit sessionKey rules, enabling disclosure of sensitive session information and potential session hijacking.
Affected Systems
Vendors: OpenClaw; Product: OpenClaw. Affected releases are version 2026.3.11 through 2026.3.24. The software runs on a Node.js environment.
Risk and Exploitability
The CVSS score of 7.1 indicates a moderate to high severity. No EPSS score is available and the issue is not catalogued in CISA’s KEV list, but the absence of official fix information suggests the risk remains. The flaw is exploitable by any code that can execute within a sandboxed child session, potentially including remote attackers who can create such sessions. Mitigation requires applying the patch or preventing the creation of child sessions until the fix is deployed.
OpenCVE Enrichment