Skip to content
Threat Feed
high advisory

OpenClaw Improper Access Control Vulnerability (CVE-2026-34512)

OpenClaw before 2026.3.25 contains an improper access control vulnerability (CVE-2026-34512) in the HTTP /sessions/:sessionKey/kill route, allowing any authenticated user to terminate arbitrary subagent sessions.

OpenClaw versions prior to 2026.3.25 are susceptible to an improper access control vulnerability, tracked as CVE-2026-34512. This flaw resides in the /sessions/:sessionKey/kill HTTP route and allows any bearer-authenticated user, regardless of their assigned privileges, to execute admin-level session termination functions. The vulnerability stems from a lack of proper scope validation, enabling attackers to bypass intended ownership and operator scope restrictions. By sending crafted, authenticated requests, an attacker can leverage the killSubagentRunAdmin function to terminate arbitrary subagent sessions. This unauthorized session termination could disrupt legitimate operations and lead to a denial-of-service condition for affected subagents.

Attack Chain

  1. An attacker authenticates to the OpenClaw application using any valid user account, obtaining a bearer token.
  2. The attacker identifies a target subagent session to terminate. This could involve enumerating active sessions or targeting a specific subagent.
  3. The attacker crafts an HTTP POST request to the /sessions/:sessionKey/kill route, replacing :sessionKey with the session key of the target subagent.
  4. The attacker includes the bearer token in the Authorization header of the HTTP request.
  5. The OpenClaw server receives the request and, due to the missing scope validation, executes the killSubagentRunAdmin function.
  6. The killSubagentRunAdmin function terminates the targeted subagent session, regardless of the attacker’s permissions.
  7. The targeted subagent is disconnected and its operations are interrupted.
  8. The attacker can repeat this process to terminate other subagent sessions, potentially causing widespread disruption.

Impact

Successful exploitation of CVE-2026-34512 allows any authenticated user to terminate arbitrary subagent sessions within the OpenClaw environment. This can lead to denial-of-service conditions for targeted subagents, potentially disrupting critical workflows and impacting overall system availability. While the specific number of potential victims is unknown, any OpenClaw deployment utilizing versions prior to 2026.3.25 is vulnerable. The impact is significant, as it allows low-privileged users to perform actions intended only for administrators.

Recommendation

  • Upgrade OpenClaw to version 2026.3.25 or later to patch CVE-2026-34512.
  • Deploy the Sigma rule Detect OpenClaw Unauthorized Session Termination to identify potential exploitation attempts.
  • Monitor web server logs for unusual activity targeting the /sessions/:sessionKey/kill route.
  • Implement strict access control policies and regularly review user permissions within OpenClaw to minimize the potential impact of compromised accounts.

Detection coverage 2

Detect OpenClaw Unauthorized Session Termination

high

Detects attempts to exploit CVE-2026-34512 by monitoring for POST requests to the /sessions/:sessionKey/kill endpoint, which could indicate unauthorized session termination attempts.

sigma tactics: privilege_escalation techniques: T1555 sources: webserver, linux

Detect OpenClaw Session Key Enumeration

medium

Detects potential reconnaissance activity by monitoring for requests listing or accessing multiple session keys, which could be an attacker identifying valid session IDs.

sigma tactics: discovery techniques: T1068 sources: webserver, linux

Detection queries are kept inside the platform. Get full rules →