Description
OpenClaw before 2026.4.20 contains a hook session-key bypass vulnerability that allows attackers to circumvent the hooks.allowRequestSessionKey opt-in restriction. Attackers can render externally influenced session keys through templated hook mappings to bypass webhook routing isolation controls.
Published: 2026-05-11
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenClaw prior to version 2026.4.20 contains a hook session-key bypass vulnerability that allows attackers to circumvent the hooks.allowRequestSessionKey opt-in restriction. Attackers can render externally influenced session keys through templated hook mappings to bypass webhook routing isolation controls. This flaw can potentially allow an attacker to manipulate or impersonate webhook traffic, undermining the integrity and confidentiality of webhook data transmitted by the application.

Affected Systems

All installations of OpenClaw running a version older than 2026.4.20 are affected. This includes any deployment where the OpenClaw application is exposing webhook functionality and supporting template-based hook mappings.

Risk and Exploitability

The CVSS score of 6.3 indicates a moderate level of severity. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, suggesting limited publicly known exploitation. The likely attack vector involves interaction with the webhook routing interface, where an attacker must supply a crafted template mapping that references an externally influenced session key. Privileges required for the attack are not explicitly defined in the description; however, it is inferred that access to create or modify hook mappings is necessary. The absence of an official workaround further emphasizes the need to address the issue through patching or stricter access controls.

Generated by OpenCVE AI on May 11, 2026 at 19:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.4.20 or later. This patch removes the ability for externally influenced session keys to bypass the hooks.allowRequestSessionKey restriction.
  • Restrict the creation and modification of hook mappings to privileged users only, ensuring that only trusted administrators can delegate webhook routes. This reduces the risk of an attacker crafting malicious mappings from non‑privileged accounts.
  • Configure the OpenClaw application to enable hooks.allowRequestSessionKey globally, ensuring that externally influenced session keys cannot bypass routing controls.

Generated by OpenCVE AI on May 11, 2026 at 19:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.20 contains a hook session-key bypass vulnerability that allows attackers to circumvent the hooks.allowRequestSessionKey opt-in restriction. Attackers can render externally influenced session keys through templated hook mappings to bypass webhook routing isolation controls.
Title OpenClaw < 2026.4.20 - Hook Session-Key Bypass via Template Mapping
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-11T19:04:58.581Z

Reserved: 2026-05-08T16:43:53.067Z

Link: CVE-2026-45002

cve-icon Vulnrichment

Updated: 2026-05-11T18:46:12.126Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-11T18:16:40.383

Modified: 2026-05-12T14:20:56.547

Link: CVE-2026-45002

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T19:15:42Z

Weaknesses