GHSA-Q2QC-744P-66R2: OpenClaw session_status Sandbox Bypass via sessionId Resolution
Vulnerability ID: GHSA-Q2QC-744P-66R2
CVSS Score: 6.5
Published: 2026-03-29
The OpenClaw AI personal assistant framework contains an authorization bypass in the session_status tool. A logic flaw in input resolution allows sandboxed subagents to query the status of parent or sibling sessions, circumventing intended visibility restrictions.
TL;DR
OpenClaw versions 2026.3.11 through 2026.3.24 fail to properly apply visibility guards when resolving sessionId aliases in the session_status tool, leading to sandbox escapes and unauthorized metadata disclosure.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-285, CWE-639
- Attack Vector: Local / Sandboxed Environment
- Impact: Unauthorized Information Disclosure
- Exploit Status: Proof of Concept Available
- CVSS Score: 6.5
- Fix Commit: d9810811b6c3c9266d7580f00574e5e02f7663de
Affected Systems
- OpenClaw Framework
- OpenClaw
session_statustool -
openclaw: >= 2026.3.11, <= 2026.3.24 (Fixed in:
2026.3.25)
Code Analysis
Commit: d981081
Fix session_status visibility guard bypass during sessionId resolution
Exploit Details
- Test Suite PoC: Proof of concept code included in the repository test suite demonstrating sandbox bypass.
Mitigation Strategies
- Upgrade the
openclawnpm package to a patched version (2026.3.26+). - Disable the
session_statustool for sandboxed agents via configuration overrides. - Monitor agent execution traces for
session_statuscalls utilizing alias formats.
Remediation Steps:
- Identify all deployments of the OpenClaw framework in your environment.
- Check the installed version of the
openclawpackage using your package manager. - Update the
openclawdependency to version2026.3.26inpackage.json. - Execute
npm installor equivalent command to apply the updated package. - Restart the OpenClaw service to ensure the patched logic is loaded.
References
- GitHub Advisory GHSA-Q2QC-744P-66R2
- Repository Security Advisory
- Fix Commit d9810811b6c3c9266d7580f00574e5e02f7663de
- GitHub Issue #42692: Unknown sessionId
Read the full report for GHSA-Q2QC-744P-66R2 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)