<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Session-Reset — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/session-reset/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 00:00:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/session-reset/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Gateway Unauthorized Session Reset Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-session-reset/</link><pubDate>Wed, 01 Apr 2026 00:00:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-session-reset/</guid><description>A vulnerability in OpenClaw Gateway allows a write-scoped gateway caller to rotate a target session, archive the prior transcript state, and force a new session id without admin scope via the `chat.send` path by reusing command authorization to trigger `/reset` session rotation.</description><content:encoded><![CDATA[<p>OpenClaw Gateway versions 2026.3.24 and earlier contain a vulnerability that allows unauthorized session resets. A write-scoped gateway caller can exploit this flaw to rotate a target session, archive the prior transcript state, and force a new session ID, actions that should be restricted to administrative users. This is possible because the <code>chat.send</code> path incorrectly reuses command authorization checks when triggering the <code>/reset</code> functionality. Defenders should upgrade to version 2026.3.28 or later to remediate this vulnerability. This issue affects deployments where write-scoped callers should not have the ability to reset sessions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OpenClaw Gateway instance running a vulnerable version (&lt;= 2026.3.24).</li>
<li>Attacker obtains valid credentials for a gateway caller with write scope permissions.</li>
<li>Attacker crafts a <code>chat.send</code> request.</li>
<li>The <code>chat.send</code> request is designed to trigger the <code>/reset</code> command within the application.</li>
<li>The application incorrectly authorizes the <code>/reset</code> command based on the write scope of the <code>chat.send</code> request.</li>
<li>The target session is rotated, archiving the previous transcript state.</li>
<li>A new session ID is forced for the target.</li>
<li>The attacker effectively resets the target session without requiring admin-level privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a write-scoped caller to perform administrative actions, specifically session resets. This could lead to disruption of service, unauthorized access to archived session data, or other unforeseen consequences depending on the specific implementation of OpenClaw Gateway. If an attacker can repeatedly reset sessions, it could create a denial-of-service condition.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw Gateway to version 2026.3.28 or later to patch the vulnerability described in <a href="https://github.com/advisories/GHSA-5r8f-96gm-5j6g">GHSA-5r8f-96gm-5j6g</a>.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Review the commit <code>be00fcfccb</code> to understand the fix and identify any potential backporting needs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>session-reset</category><category>privilege-escalation</category></item></channel></rss>