{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/session-reset/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["openclaw","session-reset","privilege-escalation"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eOpenClaw Gateway versions 2026.3.24 and earlier contain a vulnerability that allows unauthorized session resets. A write-scoped gateway caller can exploit this flaw to rotate a target session, archive the prior transcript state, and force a new session ID, actions that should be restricted to administrative users. This is possible because the \u003ccode\u003echat.send\u003c/code\u003e path incorrectly reuses command authorization checks when triggering the \u003ccode\u003e/reset\u003c/code\u003e functionality. Defenders should upgrade to version 2026.3.28 or later to remediate this vulnerability. This issue affects deployments where write-scoped callers should not have the ability to reset sessions.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAttacker identifies an OpenClaw Gateway instance running a vulnerable version (\u0026lt;= 2026.3.24).\u003c/li\u003e\n\u003cli\u003eAttacker obtains valid credentials for a gateway caller with write scope permissions.\u003c/li\u003e\n\u003cli\u003eAttacker crafts a \u003ccode\u003echat.send\u003c/code\u003e request.\u003c/li\u003e\n\u003cli\u003eThe \u003ccode\u003echat.send\u003c/code\u003e request is designed to trigger the \u003ccode\u003e/reset\u003c/code\u003e command within the application.\u003c/li\u003e\n\u003cli\u003eThe application incorrectly authorizes the \u003ccode\u003e/reset\u003c/code\u003e command based on the write scope of the \u003ccode\u003echat.send\u003c/code\u003e request.\u003c/li\u003e\n\u003cli\u003eThe target session is rotated, archiving the previous transcript state.\u003c/li\u003e\n\u003cli\u003eA new session ID is forced for the target.\u003c/li\u003e\n\u003cli\u003eThe attacker effectively resets the target session without requiring admin-level privileges.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this vulnerability allows a write-scoped caller to perform administrative actions, specifically session resets. This could lead to disruption of service, unauthorized access to archived session data, or other unforeseen consequences depending on the specific implementation of OpenClaw Gateway. If an attacker can repeatedly reset sessions, it could create a denial-of-service condition.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade OpenClaw Gateway to version 2026.3.28 or later to patch the vulnerability described in \u003ca href=\"https://github.com/advisories/GHSA-5r8f-96gm-5j6g\"\u003eGHSA-5r8f-96gm-5j6g\u003c/a\u003e.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.\u003c/li\u003e\n\u003cli\u003eReview the commit \u003ccode\u003ebe00fcfccb\u003c/code\u003e to understand the fix and identify any potential backporting needs.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-04-01T00:00:34Z","date_published":"2026-04-01T00:00:34Z","id":"/briefs/2026-04-openclaw-session-reset/","summary":"A vulnerability in OpenClaw Gateway allows a write-scoped gateway caller to rotate a target session, archive the prior transcript state, and force a new session id without admin scope via the `chat.send` path by reusing command authorization to trigger `/reset` session rotation.","title":"OpenClaw Gateway Unauthorized Session Reset Vulnerability","url":"https://feed.craftedsignal.io/briefs/2026-04-openclaw-session-reset/"}],"language":"en","title":"CraftedSignal Threat Feed — Session-Reset","version":"https://jsonfeed.org/version/1.1"}