Authorization Bypass Vulnerability in OpenClaw by OpenClaw
CVE-2026-35657

7.1HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
10 April 2026

What is CVE-2026-35657?

An authorization bypass vulnerability exists in OpenClaw prior to version 2026.3.25, specifically in the /sessions/:sessionKey/history HTTP endpoint. This issue allows attackers to circumvent scope validation for operator read permissions, enabling unauthorized access to session history data. By manipulating HTTP requests to the vulnerable route, malicious actors can view sensitive information without possessing legitimate access rights. It is crucial for users of OpenClaw to update to the latest version to safeguard against this risk.

Affected Version(s)

OpenClaw 0 < 2026.3.25

OpenClaw 2026.3.25

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Peng Zhou (@zpbrent)
.