Description
OpenClaw before 2026.3.24 contains an incorrect authorization vulnerability in the POST /reset-profile endpoint that allows authenticated callers with operator.write access to browser.request to bypass profile mutation restrictions. Attackers can invoke POST /reset-profile through the browser.request surface to stop the running browser, close Playwright connections, and move profile directories to Trash, crossing intended privilege boundaries.
Published: 2026-04-10
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch Immediately
AI Analysis

Impact

OpenClaw before version 2026.3.24 contains an incorrect authorization flaw in the POST /reset-profile endpoint that allows authenticated users with operator.write permissions on the browser.request interface to bypass profile mutation checks. This gives them the ability to stop the browser, close Playwright connections, and move profile directories to Trash, effectively elevating their privileges beyond the intended scope.

Affected Systems

The vulnerable product is the OpenClaw application; all releases prior to 2026.3.24 are affected, and the flaw impacts the POST /reset-profile route exposed through the browser.request surface.

Risk and Exploitability

The issue scores a CVSS base of 7.2, indicating high severity. Exploit requires valid credentials with operator.write rights; once obtained, the attacker can directly trigger the vulnerability in the browser, enabling privilege escalation. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, but the existing impact and relative ease of exploitation recommend prompt remediation.

Generated by OpenCVE AI on April 10, 2026 at 17:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch or upgrade to OpenClaw version 2026.3.24 or later.

Generated by OpenCVE AI on April 10, 2026 at 17:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xp9r-prpg-373r OpenClaw: `browser.request` still allows `POST /reset-profile` through the `operator.write` surface
History

Fri, 10 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.24 contains an incorrect authorization vulnerability in the POST /reset-profile endpoint that allows authenticated callers with operator.write access to browser.request to bypass profile mutation restrictions. Attackers can invoke POST /reset-profile through the browser.request surface to stop the running browser, close Playwright connections, and move profile directories to Trash, crossing intended privilege boundaries.
Title OpenClaw < 2026.3.24 - Incorrect Authorization in POST /reset-profile via browser.request
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}

cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-10T16:59:30.616Z

Reserved: 2026-04-04T12:31:23.534Z

Link: CVE-2026-35653

cve-icon Vulnrichment

Updated: 2026-04-10T16:59:26.033Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T17:17:06.170

Modified: 2026-04-13T21:06:38.420

Link: CVE-2026-35653

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T13:00:51Z

Weaknesses