CVE-2026-35621

MEDIUM

OpenClaw < 2026.3.24 - Privilege Escalation via chat.send to Allowlist Persistence

Title source: cna
STIX 2.1

Description

OpenClaw before 2026.3.24 contains a privilege escalation vulnerability where the /allowlist command fails to re-validate gateway client scopes for internal callers, allowing operator.write-scoped clients to mutate channel authorization policy. Attackers can exploit chat.send to build an internal command-authorized context and persist channel allowFrom and groupAllowFrom policy changes reserved for operator.admin scope.

Scores

CVSS v3 6.5
EPSS 0.0003
EPSS Percentile 9.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-862
Status published
Products (4)
npm/openclaw 0 - 2026.3.24npm
OpenClaw/OpenClaw < 2026.3.24
openclaw/openclaw < 2026.3.24
OpenClaw/OpenClaw 2026.3.24
Published Apr 10, 2026
Tracked Since Apr 10, 2026