OpenClaw Gateway Plugin Subagent Admin Scope Vulnerability
The openclaw package versions 2026.3.24 and earlier are vulnerable due to the gateway plugin subagent fallback `deleteSession` function dispatching `sessions.delete` with a synthetic `operator.admin` runtime scope, potentially leading to unauthorized session deletion.
The openclaw package, specifically versions up to and including 2026.3.24, contains a vulnerability within the gateway plugin subagent fallback mechanism. The deleteSession function, when invoked without a request-scoped client, incorrectly dispatched sessions.delete utilizing a synthetic operator.admin runtime scope. This means that under certain conditions, session deletion operations were being performed with elevated privileges, potentially leading to unauthorized session management. This vulnerability was present in the code up to version 2026.3.24 and has been patched in version 2026.3.25. Defenders should ensure they are running version 2026.3.25 or later to mitigate this risk.
Attack Chain
- A request is made to the gateway plugin that triggers the
deleteSessionfunction. - The
deleteSessionfunction checks for a request-scoped client. - If no request-scoped client exists, the code falls back to a default mechanism.
- The vulnerable code path then incorrectly creates a synthetic
operator.adminruntime scope. - The
sessions.deletefunction is dispatched with the elevatedoperator.adminscope. - Session deletion occurs with the privileges of the synthetic admin operator.
- An attacker could potentially trigger this code path to delete sessions they should not have access to.
Impact
Successful exploitation of this vulnerability could lead to unauthorized session deletion within the openclaw application. While the exact impact depends on the specific deployment and usage of openclaw, the ability to delete arbitrary sessions could disrupt service availability or allow an attacker to invalidate legitimate user sessions. If an attacker can reliably trigger this vulnerability, it could lead to denial-of-service or other forms of service disruption.
Recommendation
- Upgrade the
openclawpackage to version 2026.3.25 or later to remediate the vulnerability described in the overview. - Review the
openclawcodebase and audit the usage ofdeleteSessionto identify any potential misuse or unexpected invocations.
Detection coverage 2
Detect OpenClaw Admin Scope Session Deletion
highDetects calls to deleteSession with a synthetic operator.admin scope within OpenClaw. This may indicate exploitation of the vulnerability.
OpenClaw deleteSession Fallback Without Client Context
mediumDetects when the deleteSession function in OpenClaw is called without a valid client context, potentially leading to the use of a synthetic admin scope.
Detection queries are kept inside the platform. Get full rules →