GHSA-f6h3-846h-2r8w: Authorization Bypass in OpenClaw via Improper Recipient Validation
Vulnerability ID: GHSA-F6H3-846H-2R8W
CVSS Score: 9.8
Published: 2026-03-04
OpenClaw (formerly Clawdbot) contains a critical authorization bypass vulnerability in its elevated permissions module. The vulnerability arises from an overly permissive validation logic in the isApprovedElevatedSender function, which incorrectly includes the message recipient's identifier (the bot itself) in the authorization check. If an administrator includes the bot's own identity in the tools.elevated.allowFrom configuration—a common configuration pattern for self-testing—any unauthenticated remote user can execute commands with elevated privileges by simply sending a message to the bot.
TL;DR
A logic flaw in OpenClaw's authorization system allows attackers to bypass access controls for elevated commands. By sending a message to a bot that has its own ID whitelisted, the system validates the request based on the recipient's identity rather than the sender's, granting full administrative access to unauthorized users.
⚠️ Exploit Status: POC
Technical Details
- CWE: CWE-285: Improper Authorization
- CVSS v3.1: 9.8 (Critical)
- Attack Vector: Network (Remote)
- Privileges Required: None
- User Interaction: None
- Patch Status: Released (2026-02-22)
Affected Systems
- OpenClaw (formerly Clawdbot/Moltbot)
-
OpenClaw: < 2026.3.2 (Fixed in:
2026.3.2)
Code Analysis
Commit: 6817c0e
Fix elevated sender authorization logic to exclude recipient tokens and enforce identity prefixes
Mitigation Strategies
- Software Update
- Configuration Audit
- Principle of Least Privilege
Remediation Steps:
-
Update OpenClaw: Upgrade immediately to the latest version (post-February 22, 2026) which includes the fix from commit
6817c0ec7b4fa830123d4f5c340f075a4bd04ee2. -
Audit Configuration: Inspect the
tools.elevated.allowFromsection of yourconfig.jsonfile. - Remove Self-References: Ensure the bot's own identifier (phone number, bot ID, handle) is NOT present in the allowlist.
-
Enforce Prefixes: Convert all existing allowlist entries to use strict prefixes. Change plain IDs to
id:<number>orusername:<name>to prevent ambiguity. Preferid:(immutable) overname:(mutable/spoofable).
References
- GitHub Advisory GHSA-F6H3-846H-2R8W
- ZeroPath Blog: OpenClaw Credential Theft
- OpenClaw Security Documentation
Read the full report for GHSA-F6H3-846H-2R8W on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)