CVE-2026-35660
HIGHOpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions. Attackers with operator.write privileges can invoke /reset or /new messages with an explicit sessionKey to bypass operator.admin requirements and reset arbitrary sessions.
Published: 4/10/2026Modified: 4/13/2026
References (4)
https://github.com/openclaw/openclaw/commit/50f6a2f136fed85b58548a38f7a3dbb98d2cd1a0Patchhttps://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87Patchhttps://github.com/openclaw/openclaw/security/advisories/GHSA-wq58-2pvg-5h4fVendor Advisoryhttps://www.vulncheck.com/advisories/openclaw-insufficient-access-control-in-gateway-agent-session-resetThird Party Advisory