Impact
OpenClaw versions before 2026.28 expose a privilege escalation flaw that allows an authenticated operator with write rights to exploit the chat.send endpoint and modify the Talk Voice configuration reserved for administrators. The bug stems from insufficient authorization controls (CWE‑863), enabling attackers to change persistent voice configuration data and thereby gain administrative control beyond their granted scope.
Affected Systems
The affected product is OpenClaw as distributed via the node.js package. Any release earlier than 2026.28 is impacted. The vulnerability applies to deployments that expose the chat.send API and grant operator.write permission to users.
Risk and Exploitability
The CVSS score of 7.1 reflects medium severity; the EPSS score is not reported and the flaw is not listed in the CISA KEV catalog. An attacker must first authenticate as an operator with write privileges and then call the publicly accessible chat.send endpoint, which is the likely attack vector. Upon success the attacker can rewrite admin‑only voice settings, potentially enabling further malicious actions such as unauthorized data collection or system disruption.
OpenCVE Enrichment