Untriaged
Permalink
CVE-2026-32919
6.1 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): HIGH
OpenClaw < 2026.3.11 - Unauthorized Session Reset via agent Slash Commands
OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing write-scoped callers to reach admin-only session reset logic. Attackers with operator.write scope can issue agent requests containing /new or /reset slash commands to reset targeted conversation state without holding operator.admin privileges.
References
-
GitHub Security Advisory (GHSA-jf6w-m8jw-jfxc) third-party-advisory
Affected products
OpenClaw
- ==2026.3.11
- <2026.3.11
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>