Impact
OpenClaw versions prior to 2026.3.25 allow an attacker to gain administrative privileges by invoking the deleteSession function within the gateway plugin subagent fallback. The function employs a synthetic operator.admin runtime scope and does not require a request‑scoped client, enabling the attacker to execute privileged actions that are normally restricted to an administrative context.
Affected Systems
The affected software is the OpenClaw Node.js application. All releases before 2026.3.25 are impacted. Any deployment that exposes the gateway plugin subagent fallback deleteSession endpoint is vulnerable, regardless of operating platform.
Risk and Exploitability
The CVSS score of 6.1 reflects moderate severity. EPSS data shows a low exploitation probability of <1%. The vulnerability is not listed in the CISA KEV catalog. An attacker who can trigger the deleteSession call without a request‑scoped client can elevate their privileges to administrative scope, potentially performing unauthorized privileged operations. No additional authentication steps are documented in the advisory.
OpenCVE Enrichment
Github GHSA