Impact
OpenClaw versions before 2026.4.14 allow a message‑queue authorization context reuse flaw. When multiple messages are queued in collect‑mode batches, the authorization context of the last sender sent to the batch is applied to all messages in that batch. This means that earlier messages, potentially submitted by less privileged users, could execute with the elevated permissions of the final sender. The weakness is an authorization bypass (CWE‑266) that can compromise confidentiality, integrity, and availability of the application by granting unauthorized access to protected resources.
Affected Systems
The affected system is OpenClaw, version 2026.4.13 and earlier. The vulnerability affects the queue component that handles collect‑mode batch processing.
Risk and Exploitability
The CVSS score is 7.6, indicating a high severity. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog, so no public exploit data is known. Based on the description, the likely attack vector is sending queued messages via the application’s enqueue interface; an attacker with the ability to submit messages can drain a batch using a privileged sender and cause earlier messages to run with that elevated context. The risk is elevated if privileged senders are present and if collect‑mode batches are enabled in a production environment.
OpenCVE Enrichment
Github GHSA