OpenClaw Improper Access Control Vulnerability (CVE-2026-34512)
OpenClaw before 2026.3.25 contains an improper access control vulnerability (CVE-2026-34512) in the HTTP /sessions/:sessionKey/kill route, allowing any authenticated user to terminate arbitrary subagent sessions.
OpenClaw versions prior to 2026.3.25 are susceptible to an improper access control vulnerability, tracked as CVE-2026-34512. This flaw resides in the /sessions/:sessionKey/kill HTTP route and allows any bearer-authenticated user, regardless of their assigned privileges, to execute admin-level session termination functions. The vulnerability stems from a lack of proper scope validation, enabling attackers to bypass intended ownership and operator scope restrictions. By sending crafted, authenticated requests, an attacker can leverage the killSubagentRunAdmin function to terminate arbitrary subagent sessions. This unauthorized session termination could disrupt legitimate operations and lead to a denial-of-service condition for affected subagents.
Attack Chain
- An attacker authenticates to the OpenClaw application using any valid user account, obtaining a bearer token.
- The attacker identifies a target subagent session to terminate. This could involve enumerating active sessions or targeting a specific subagent.
- The attacker crafts an HTTP POST request to the
/sessions/:sessionKey/killroute, replacing:sessionKeywith the session key of the target subagent. - The attacker includes the bearer token in the
Authorizationheader of the HTTP request. - The OpenClaw server receives the request and, due to the missing scope validation, executes the
killSubagentRunAdminfunction. - The
killSubagentRunAdminfunction terminates the targeted subagent session, regardless of the attacker’s permissions. - The targeted subagent is disconnected and its operations are interrupted.
- The attacker can repeat this process to terminate other subagent sessions, potentially causing widespread disruption.
Impact
Successful exploitation of CVE-2026-34512 allows any authenticated user to terminate arbitrary subagent sessions within the OpenClaw environment. This can lead to denial-of-service conditions for targeted subagents, potentially disrupting critical workflows and impacting overall system availability. While the specific number of potential victims is unknown, any OpenClaw deployment utilizing versions prior to 2026.3.25 is vulnerable. The impact is significant, as it allows low-privileged users to perform actions intended only for administrators.
Recommendation
- Upgrade OpenClaw to version 2026.3.25 or later to patch CVE-2026-34512.
- Deploy the Sigma rule
Detect OpenClaw Unauthorized Session Terminationto identify potential exploitation attempts. - Monitor web server logs for unusual activity targeting the
/sessions/:sessionKey/killroute. - Implement strict access control policies and regularly review user permissions within OpenClaw to minimize the potential impact of compromised accounts.
Detection coverage 2
Detect OpenClaw Unauthorized Session Termination
highDetects attempts to exploit CVE-2026-34512 by monitoring for POST requests to the /sessions/:sessionKey/kill endpoint, which could indicate unauthorized session termination attempts.
Detect OpenClaw Session Key Enumeration
mediumDetects potential reconnaissance activity by monitoring for requests listing or accessing multiple session keys, which could be an attacker identifying valid session IDs.
Detection queries are kept inside the platform. Get full rules →