OpenClaw Insufficient Access Control in Gateway Agent Session Reset (CVE-2026-35660)
OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions by invoking /reset or /new messages with an explicit sessionKey, bypassing operator.admin requirements.
OpenClaw, a yet-to-be-defined application, suffers from an insufficient access control vulnerability (CVE-2026-35660) affecting versions prior to 2026.3.23. The vulnerability exists within the Gateway agent’s /reset endpoint. An attacker possessing operator.write permissions can exploit this flaw to reset administrative sessions, circumventing the intended operator.admin requirement. Specifically, the vulnerability allows attackers to invoke /reset or /new messages including an explicit sessionKey to manipulate arbitrary sessions. This could lead to unauthorized access and modification of sensitive system configurations, depending on the scope of the OpenClaw application. The vulnerability was disclosed on April 10, 2026.
Attack Chain
- An attacker gains unauthorized
operator.writeprivileges within the OpenClaw application, potentially through account compromise or privilege escalation from another vulnerability. - The attacker crafts a malicious HTTP request targeting the Gateway agent’s
/resetendpoint. - The crafted request includes a specific
sessionKeybelonging to an administrative user. - Alternatively, the attacker could send a
/newmessage containing the admin’ssessionKey. - Due to the insufficient access control, the Gateway agent processes the request, incorrectly resetting the targeted admin session.
- The administrative user is forcibly logged out of their session, disrupting their work.
- The attacker could potentially hijack the reset session depending on implementation details.
- The attacker could then use their elevated access to perform unauthorized actions, such as modifying critical system configurations or accessing sensitive data.
Impact
Successful exploitation of CVE-2026-35660 allows attackers with operator.write privileges to reset arbitrary admin sessions in OpenClaw. This can lead to denial of service for legitimate administrators, and potentially allow the attacker to hijack the reset session or perform unauthorized actions, leading to data breaches or system compromise, depending on the application’s functionalities and the scope of admin privileges. The severity is rated as high with a CVSS score of 8.1.
Recommendation
- Upgrade OpenClaw to version 2026.3.23 or later to patch CVE-2026-35660.
- Review and enforce strict access control policies for the OpenClaw application, ensuring that
operator.writeprivileges are only granted to trusted users. - Monitor web server logs for suspicious requests to the
/resetendpoint, especially those containing explicitsessionKeyparameters and correlate with user roles. - Deploy the Sigma rule “Detect OpenClaw Session Reset Attempt” to detect exploitation attempts (see below).
Detection coverage 2
Detect OpenClaw Session Reset Attempt
highDetects attempts to reset admin sessions in OpenClaw via the /reset endpoint, exploiting CVE-2026-35660.
Detect OpenClaw New Session with Admin Key
highDetects attempts to create a new session using an existing admin sessionKey, potentially bypassing authentication.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
4
url
| Type | Value |
|---|---|
| url | https://github.com/openclaw/openclaw/commit/50f6a2f136fed85b58548a38f7a3dbb98d2cd1a0 |
| url | https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87 |
| url | https://github.com/openclaw/openclaw/security/advisories/GHSA-wq58-2pvg-5h4f |
| url | https://www.vulncheck.com/advisories/openclaw-insufficient-access-control-in-gateway-agent-session-reset |
| [email protected] |