Impact
OpenClaw versions prior to 2026.3.31 contain an incomplete scope‑clearing bug in trusted‑proxy authentication that lets attackers declare operator scopes on non‑Control‑UI clients. By doing so, self‑declared scopes persist on identity‑bearing authentication paths and grant the attacker operator.admin privileges, effectively allowing full administrative control over the application. The flaw represents an improper authorization weakness (CWE‑863).
Affected Systems
The vulnerability affects the OpenClaw product from the vendor OpenClaw. All installations running any version earlier than 2026.3.31 that rely on trusted‑proxy authentication are susceptible.
Risk and Exploitability
The CVSS score of 7.7 indicates high severity, and the EPSS score is not reported, suggesting a lower but still measurable risk of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack path is inferred to require a trusted‑proxy authentication context; an attacker can script scope declaration through a non‑Control‑UI client to hijack the session. Given the administrative gain, the impact is significant for confidentiality, integrity, and availability of the underlying systems.
OpenCVE Enrichment