Impact
OpenClaw versions 2026.4.5 through 2026.4.9 allow actors with write‑scoped gateway privileges to alter memory dreaming settings through the /dreaming endpoint, enabling them to toggle admin‑class configuration mutations. This missing authorization flaw (CWE‑862) lets a user who ordinarily has only write scope obtain administrative privileges on the product, compromising the system’s integrity and potentially allowing further unauthorized actions.
Affected Systems
The affected product is OpenClaw. Versions below 2026.4.10, specifically 2026.4.5 up to 2026.4.9, are impacted, while the fix is included in version 2026.4.10 and later.
Risk and Exploitability
The CVSS score of 7.1 marks the vulnerability as high severity; EPSS information is unavailable, and it is not listed in the CISA KEV catalog. Attackers who already control a write‑scoped gateway session can send a request to the /dreaming endpoint to change configuration; no additional payload is required. The flaw stems from missing authorization checks, so the exploit is limited to systems where the endpoint is reachable to a write‑scoped user.
OpenCVE Enrichment
Github GHSA