Medium severity6.5NVD Advisory· Published Apr 10, 2026· Updated Apr 13, 2026
CVE-2026-35621
CVE-2026-35621
Description
OpenClaw before 2026.3.24 contains a privilege escalation vulnerability where the /allowlist command fails to re-validate gateway client scopes for internal callers, allowing operator.write-scoped clients to mutate channel authorization policy. Attackers can exploit chat.send to build an internal command-authorized context and persist channel allowFrom and groupAllowFrom policy changes reserved for operator.admin scope.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openclawnpm | < 2026.3.24 | 2026.3.24 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/openclaw/openclaw/security/advisories/GHSA-94pw-c6m8-p9p9nvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-94pw-c6m8-p9p9ghsaADVISORY
- www.vulncheck.com/advisories/openclaw-privilege-escalation-via-chat-send-to-allowlist-persistencenvdThird Party Advisory
News mentions
0No linked articles in our index yet.