OpenClaw Gateway Unauthorized Session Reset Vulnerability
A vulnerability in OpenClaw Gateway allows a write-scoped gateway caller to rotate a target session, archive the prior transcript state, and force a new session id without admin scope via the `chat.send` path by reusing command authorization to trigger `/reset` session rotation.
OpenClaw Gateway versions 2026.3.24 and earlier contain a vulnerability that allows unauthorized session resets. A write-scoped gateway caller can exploit this flaw to rotate a target session, archive the prior transcript state, and force a new session ID, actions that should be restricted to administrative users. This is possible because the chat.send path incorrectly reuses command authorization checks when triggering the /reset functionality. Defenders should upgrade to version 2026.3.28 or later to remediate this vulnerability. This issue affects deployments where write-scoped callers should not have the ability to reset sessions.
Attack Chain
- Attacker identifies an OpenClaw Gateway instance running a vulnerable version (<= 2026.3.24).
- Attacker obtains valid credentials for a gateway caller with write scope permissions.
- Attacker crafts a
chat.sendrequest. - The
chat.sendrequest is designed to trigger the/resetcommand within the application. - The application incorrectly authorizes the
/resetcommand based on the write scope of thechat.sendrequest. - The target session is rotated, archiving the previous transcript state.
- A new session ID is forced for the target.
- The attacker effectively resets the target session without requiring admin-level privileges.
Impact
Successful exploitation of this vulnerability allows a write-scoped caller to perform administrative actions, specifically session resets. This could lead to disruption of service, unauthorized access to archived session data, or other unforeseen consequences depending on the specific implementation of OpenClaw Gateway. If an attacker can repeatedly reset sessions, it could create a denial-of-service condition.
Recommendation
- Upgrade OpenClaw Gateway to version 2026.3.28 or later to patch the vulnerability described in GHSA-5r8f-96gm-5j6g.
- Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.
- Review the commit
be00fcfccbto understand the fix and identify any potential backporting needs.
Detection coverage 2
Detect OpenClaw Gateway Chat Send Reset Command
highDetects chat.send requests that may trigger a session reset due to command authorization vulnerability.
Detect OpenClaw Gateway Session Reset via API
criticalDetects direct attempts to reset a session via the OpenClaw Gateway API, which should be restricted to administrators.
Detection queries are kept inside the platform. Get full rules →