GHSA-5JVJ-HXMH-6H6J: Authorization Bypass in OpenClaw Gateway HTTP Session History
Vulnerability ID: GHSA-5JVJ-HXMH-6H6J
CVSS Score: 5.3
Published: 2026-03-29
The OpenClaw Gateway HTTP API contains an incorrect authorization implementation that fails to enforce operator read scopes on the session history route. This flaw allows users with low-privileged authentication tokens to read sensitive chat transcripts that should be restricted to operators with explicit read permissions.
TL;DR
An authorization bypass in the openclaw npm package allows any user with a valid Bearer token to read session chat histories via the HTTP API, bypassing the strict operator.read scope requirements enforced on the equivalent WebSocket interface.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-863
- Attack Vector: Network (HTTP)
- Authentication Required: Yes (Low Privilege)
- Impact: Confidentiality (High)
- Exploit Status: Proof-of-Concept Available
- CVSSv3 Score: 5.3
Affected Systems
- OpenClaw Gateway HTTP API
- openclaw npm package
-
openclaw: <= 2026.3.24 (Fixed in:
2026.3.25)
Code Analysis
Commit: 1c45123
Fix HTTP session history route authorization bypass
Exploit Details
- Public Commit: The patch commit contains details and testing reproduction methods outlining the attack.
Mitigation Strategies
- Update the openclaw package to the patched version.
- Update HTTP API clients to send the required x-openclaw-scopes header.
- Implement a centralized authorization middleware to prevent transport-specific access control gaps.
Remediation Steps:
- Identify all projects utilizing the openclaw npm package.
- Modify the package.json to require openclaw version 2026.3.25 or greater.
- Run
npm installoryarn installto apply the update. - Update any custom HTTP clients querying the
/sessions/:sessionKey/historyroute to append thex-openclaw-scopes: operator.readheader. - Verify the fix by attempting to access the route with a token lacking the operator.read scope and confirming a 403 response.
References
Read the full report for GHSA-5JVJ-HXMH-6H6J on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)