Description
OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in the HTTP /sessions/:sessionKey/history route that skips operator.read scope validation. Attackers can access session history without proper operator read permissions by sending HTTP requests to the vulnerable endpoint.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5jvj-hxmh-6h6j | OpenClaw: Gateway HTTP Session History Route Bypasses Operator Read Scope |
References
History
Fri, 10 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in the HTTP /sessions/:sessionKey/history route that skips operator.read scope validation. Attackers can access session history without proper operator read permissions by sending HTTP requests to the vulnerable endpoint. | |
| Title | OpenClaw < 2026.3.25 - Authorization Bypass in HTTP Session History Route | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-863 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-10T16:03:19.372Z
Reserved: 2026-04-04T12:31:57.498Z
Link: CVE-2026-35657
No data.
Status : Received
Published: 2026-04-10T17:17:06.913
Modified: 2026-04-10T17:17:06.913
Link: CVE-2026-35657
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA