Authorization Bypass in OpenClaw Product by OpenClaw
CVE-2026-41298

5.3MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
20 April 2026

What is CVE-2026-41298?

The OpenClaw platform prior to version 2026.4.2 has a significant flaw where the POST /sessions/:sessionKey/kill endpoint does not enforce appropriate write scopes in identity-bearing HTTP modes. This oversight allows unauthorized users with read access to terminate active subagent sessions by exploiting this endpoint, undermining the integrity of session management and authorization controls.

Affected Version(s)

OpenClaw 0 < 2026.4.2

OpenClaw 2026.4.2

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ea001 (@EaEa0001)
.