<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35660 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35660/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 10 Apr 2026 17:50:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35660/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Insufficient Access Control in Gateway Agent Session Reset (CVE-2026-35660)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-reset-vuln/</link><pubDate>Fri, 10 Apr 2026 17:50:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-reset-vuln/</guid><description>OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions by invoking /reset or /new messages with an explicit sessionKey, bypassing operator.admin requirements.</description><content:encoded><![CDATA[<p>OpenClaw, a yet-to-be-defined application, suffers from an insufficient access control vulnerability (CVE-2026-35660) affecting versions prior to 2026.3.23. The vulnerability exists within the Gateway agent&rsquo;s <code>/reset</code> endpoint.  An attacker possessing <code>operator.write</code> permissions can exploit this flaw to reset administrative sessions, circumventing the intended <code>operator.admin</code> requirement.  Specifically, the vulnerability allows attackers to invoke <code>/reset</code> or <code>/new</code> messages including an explicit <code>sessionKey</code> to manipulate arbitrary sessions. This could lead to unauthorized access and modification of sensitive system configurations, depending on the scope of the OpenClaw application. The vulnerability was disclosed on April 10, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized <code>operator.write</code> privileges within the OpenClaw application, potentially through account compromise or privilege escalation from another vulnerability.</li>
<li>The attacker crafts a malicious HTTP request targeting the Gateway agent&rsquo;s <code>/reset</code> endpoint.</li>
<li>The crafted request includes a specific <code>sessionKey</code> belonging to an administrative user.</li>
<li>Alternatively, the attacker could send a <code>/new</code> message containing the admin&rsquo;s <code>sessionKey</code>.</li>
<li>Due to the insufficient access control, the Gateway agent processes the request, incorrectly resetting the targeted admin session.</li>
<li>The administrative user is forcibly logged out of their session, disrupting their work.</li>
<li>The attacker could potentially hijack the reset session depending on implementation details.</li>
<li>The attacker could then use their elevated access to perform unauthorized actions, such as modifying critical system configurations or accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35660 allows attackers with <code>operator.write</code> privileges to reset arbitrary admin sessions in OpenClaw. This can lead to denial of service for legitimate administrators, and potentially allow the attacker to hijack the reset session or perform unauthorized actions, leading to data breaches or system compromise, depending on the application&rsquo;s functionalities and the scope of admin privileges. The severity is rated as high with a CVSS score of 8.1.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.23 or later to patch CVE-2026-35660.</li>
<li>Review and enforce strict access control policies for the OpenClaw application, ensuring that <code>operator.write</code> privileges are only granted to trusted users.</li>
<li>Monitor web server logs for suspicious requests to the <code>/reset</code> endpoint, especially those containing explicit <code>sessionKey</code> parameters and correlate with user roles.</li>
<li>Deploy the Sigma rule &ldquo;Detect OpenClaw Session Reset Attempt&rdquo; to detect exploitation attempts (see below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-35660</category><category>openclaw</category><category>access-control</category><category>privilege-escalation</category></item></channel></rss>