Impact
OpenClaw versions before 2026.3.28 contain an improper authorization flaw (CWE‑863) that allows users with a write‑scoped gateway role to trigger admin‑only session reset operations. By abusing the chat.send API, attackers can rotate target sessions, archive transcript state, and force new session identifiers without possessing admin scope, effectively bypassing role boundaries and enabling session impersonation.
Affected Systems
Any deployment of OpenClaw running a pre‑2026.3.28 release is vulnerable. The product is identified as OpenClaw by the vendor, and the specific version range is all releases earlier than 2026.3.28.
Risk and Exploitability
With a CVSS score of 8.4 the vulnerability is classified as high severity. EPSS data is not available, and the flaw is not listed in CISA’s KEV catalog. The likely attack vector is via the chat.send endpoint exposed by the application; an attacker who can call this API with a write‑scoped gateway token can perform the escalation without higher privileges. This provides a practical path to compromise authenticated sessions and potentially gain broader access to the system.
OpenCVE Enrichment