Description
OpenClaw before 2026.3.31 contains a session visibility bypass vulnerability where the session_status function fails to enforce configured tools.sessions.visibility restrictions for unsandboxed invocations. Attackers can invoke session_status without sandbox constraints to bypass session-policy controls and access restricted session information.
Published: 2026-04-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass – unintended access to restricted session information
Action: Apply Patch
AI Analysis

Impact

The vulnerability allows attackers to call the session_status function without the protective sandbox, bypassing the tool's configured visibility restrictions. As a result, unauthorized users can obtain session data that should be protected, potentially exposing sensitive authentication tokens or user information. The weakness is an authorization bypass, identified as CWE-863, and is primarily an information disclosure risk.

Affected Systems

The flaw is present in all releases of OpenClaw OpenClaw prior to version 2026.3.31. Clients using versions earlier than that should consider them vulnerable, regardless of the underlying OS or runtime environment. The affected component is the session_status API implemented in the core client library.

Risk and Exploitability

The CVSS v3.1 score of 5.3 indicates a moderate severity. The EPSS score of less than 1% suggests that exploitation is currently low probability, and the vulnerability is not listed in the CISA KEV catalog. Nevertheless, the attack could succeed if an attacker can trigger an unsandboxed invocation of the affected API, which may be possible in environments with elevated privileges or misconfigured APIs. In those scenarios, the attacker could read session details and potentially use them for further exploitation.

Generated by OpenCVE AI on April 28, 2026 at 07:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.3.31 or later to apply the session visibility enforcement fix.
  • If an immediate upgrade is not possible, restrict or disable unsandboxed invocations of the session_status endpoint to prevent bypass.
  • Enforce strict session policy rules and monitor for unexpected calls to session_status from unauthorized sources.

Generated by OpenCVE AI on April 28, 2026 at 07:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 24 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.31 contains a session visibility bypass vulnerability where the session_status function fails to enforce configured tools.sessions.visibility restrictions for unsandboxed invocations. Attackers can invoke session_status without sandbox constraints to bypass session-policy controls and access restricted session information.
Title OpenClaw < 2026.3.31 - Session Visibility Bypass via session_status in Unsandboxed Invocations
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-24T18:19:11.543Z

Reserved: 2026-04-20T14:07:26.648Z

Link: CVE-2026-41350

cve-icon Vulnrichment

Updated: 2026-04-24T16:50:13.597Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T22:16:42.000

Modified: 2026-04-28T18:56:39.550

Link: CVE-2026-41350

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T07:30:26Z

Weaknesses