CVE-2026-41371
OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in chat.send that allows write-scoped gateway callers to trigger admin-only session reset operations. Attackers can rotate target sessions, archive prior transcript state, and force new session IDs without requiring admin scope by exploiting improper authorization checks in the chat.send path.
View on NVDAnalysis
OpenClaw appears to be a specialized chat orchestration or integration tool with limited widespread adoption in the general dev ecosystem. While a privilege escalation from write-scope to admin-scope is a serious high-severity bug (CVSS 8.5), the tool's niche status doesn't meet the threshold for a broad community alert in the absence of active exploitation.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:LCWE-863EPSS
Affects
openclaw:openclawTechnical description
OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in chat.send that allows write-scoped gateway callers to trigger admin-only session reset operations. Attackers can rotate target sessions, archive prior transcript state, and force new session IDs without requiring admin scope by exploiting improper authorization checks in the chat.send path.