CVE-2026-32916
OpenClaw · OpenClaw
OpenClaw versions before 2026.3.11 contain an unauthenticated authorization bypass allowing remote attackers to execute privileged gateway actions via synthetic operator clients.
Executive summary
A critical authorization bypass in OpenClaw allows unauthenticated remote attackers to perform administrative actions, including session deletion and agent execution, posing a severe risk to system integrity.
Vulnerability
This flaw involves an authorization bypass within plugin subagent routes that utilize a synthetic operator client with excessive administrative scopes. Remote unauthenticated attackers can target these routes to invoke runtime methods and perform privileged actions without valid credentials.
Business impact
A successful exploit allows an external actor to gain administrative control over gateway functions, leading to unauthorized session termination or malicious agent execution. Given the CVSS score of 9.4, this vulnerability represents a critical threat that could result in total system compromise, data loss, and significant operational downtime. The ability for unauthenticated users to bypass security controls necessitates immediate remediation.
Remediation
Immediate Action: Administrators must upgrade OpenClaw to version 2026.3.11 or later immediately to patch the vulnerable subagent routing logic.
Proactive Monitoring: Security teams should review gateway access logs for unusual requests to plugin-owned routes and monitor for unauthorized agent execution or unexpected session terminations.
Compensating Controls: Implementing strict IP whitelisting for gateway access and deploying a Web Application Firewall (WAF) to filter suspicious runtime method calls can provide temporary protection.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The severity of this authorization bypass cannot be overstated, as it grants administrative-level access to unauthenticated remote users. Organizations using affected versions of OpenClaw must prioritize the application of the official vendor patch immediately. Failure to update leaves the infrastructure vulnerable to complete takeover and persistent unauthorized access.