Description
OpenClaw before 2026.4.10 contains an authorization bypass vulnerability allowing operator.write message-tool paths to access Matrix profile persistence requiring admin-level authority. Attackers can exploit insufficient access controls to mutate persistent profile configuration through non-owner message-tool runs.
Published: 2026-05-05
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Based on the description, it is inferred that the missing authorization check allows an unauthorized user to call the operator.write message-tool API and change the persistent Matrix profile configuration. The vulnerability is a straightforward authorization bypass (CWE‑862). The exploit does not give the attacker code execution or denial of service, but the ability to alter configuration that normally requires admin authority could compromise the platform’s integrity, confidentiality, and availability.

Affected Systems

Affected systems include installations of OpenClaw using any version prior to 2026.4.10. The vulnerability is triggered when the operator.write message-tool paths are invoked, allowing message-tool runs by non‑owners to alter Matrix profile persistence settings. Users who have access to the message-tool interface without admin rights are at risk if the authorization checks are not enforced.

Risk and Exploitability

The likely attack vector is any user who can invoke the operator.write message-tool path; this could be remote or local depending on how OpenClaw is exposed. Based on the description, it is inferred that the vulnerability can be exploited without requiring elevated privileges beyond the ability to run message-tool writes. The EPSS score is not available, however the CVSS score of 7.1 indicates a moderate to high risk of exploitation. The vulnerability is not listed in CISA’s KEV catalog. If an attacker changes configuration, it could serve as a foothold for further compromise.

Generated by OpenCVE AI on May 5, 2026 at 12:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OpenClaw 2026.4.10 or later to apply the vendor fix for the authorization bypass
  • If an immediate upgrade is not possible, reconfigure the system so that operator.write message-tool paths are granted only to administrative roles; review and tighten ACLs for message-tool execution
  • Implement or verify role‑based access controls to ensure that only users with admin privileges can mutate persistent profile configuration, and monitor for unauthorized message-tool activity

Generated by OpenCVE AI on May 5, 2026 at 12:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7jp6-r74r-995q OpenClaw: Matrix profile config persistence was reachable from operator.write message tools
History

Tue, 05 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 05 May 2026 11:45:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.10 contains an authorization bypass vulnerability allowing operator.write message-tool paths to access Matrix profile persistence requiring admin-level authority. Attackers can exploit insufficient access controls to mutate persistent profile configuration through non-owner message-tool runs.
Title OpenClaw < 2026.4.10 - Unauthorized Matrix Profile Config Persistence Access via operator.write Message Tools
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-862
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-05T14:12:48.826Z

Reserved: 2026-04-27T11:40:07.151Z

Link: CVE-2026-42433

cve-icon Vulnrichment

Updated: 2026-05-05T13:48:54.785Z

cve-icon NVD

Status : Received

Published: 2026-05-05T12:16:17.627

Modified: 2026-05-05T12:16:17.627

Link: CVE-2026-42433

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T13:00:07Z

Weaknesses