<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Insufficient-Access-Control — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/insufficient-access-control/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 13:16:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/insufficient-access-control/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Insufficient Access Control Vulnerability (CVE-2026-32914)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-access-control/</link><pubDate>Sun, 29 Mar 2026 13:16:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-access-control/</guid><description>OpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces, enabling attackers with command authorization to read or modify privileged configuration settings.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.3.12 are vulnerable to an insufficient access control issue, designated as CVE-2026-32914. This vulnerability resides in the <code>/config</code> and <code>/debug</code> command handlers. An attacker who possesses command authorization, but lacks owner privileges, can leverage this flaw to access sensitive owner-only surfaces. The absence of proper owner-level permission checks allows unauthorized users to potentially read or modify privileged configuration settings that should be…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>insufficient-access-control</category><category>privilege-escalation</category><category>web-application</category></item></channel></rss>