Impact
OpenClaw versions that precede 2026.3.22 contain a flaw in the send action that fails to enforce the controlScope parameter, enabling leaf subagents to send messages to child sessions that lie outside their authorized scope. This bypass of the intended access control boundaries allows an attacker who can influence a subagent to communicate with sessions they should not be able to reach.
Affected Systems
The vulnerability affects the OpenClaw OpenClaw application in all releases prior to 2026.3.22. Any installation that has not been updated to at least version 2026.3.22 remains vulnerable.
Risk and Exploitability
The assigned CVSS score is 5.3, indicating a medium severity rating. No publicly disclosed exploit exists and the vulnerability is not listed in the CISA KEV catalog. While the input does not specify the exact attack vector, it can be inferred that an adversary would need the ability to trigger the send action from within the application—typically by controlling a subordinate agent or injecting a malicious subagent—to exploit the missing controlScope enforcement.
OpenCVE Enrichment
Github GHSA