CVE-2026-32976
Received Received - Intake
Authorization Bypass in OpenClaw Allows Unauthorized Account Configuration Changes

Publication date: 2026-03-31

Last updated on: 2026-04-02

Assigner: VulnCheck

Description
OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing channel commands to mutate protected sibling-account configuration despite configWrites restrictions. Attackers with authorized access on one account can execute channel commands like /config set channels.<provider>.accounts.<id> to modify configuration on target accounts with configWrites: false.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-03-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.11 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-32976 is an authorization bypass vulnerability in OpenClaw versions before 2026.3.11. It allows an attacker who has authorized access to one account to bypass restrictions that normally prevent them from modifying configuration settings of sibling accounts.

Specifically, the vulnerability arises because channel commands, such as /config set channels.<provider>.accounts.<id>, do not properly verify authorization against the target account's scope. This means an attacker can mutate protected configurations on other accounts even when those accounts have configWrites set to false.

The root cause is a failure to consistently enforce authorization checks on the target account when executing channel commands, leading to unauthorized integrity modifications of sibling account configurations.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker with access to one account to modify configuration settings of other sibling accounts without proper authorization.

Such unauthorized configuration changes can compromise the integrity of protected account settings, potentially leading to misconfigurations, security policy violations, or other unintended behaviors within your deployment.

Because the attacker does not need elevated privileges beyond authorized access to one account, and no user interaction is required, the risk of exploitation is significant in environments where multiple accounts coexist.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthorized configuration changes via channel commands such as /config set channels.<provider>.accounts.<id>. To detect exploitation attempts on your system, monitor for usage of channel commands that modify sibling account configurations, especially commands targeting channels.<provider>.accounts.<id> paths.

You can look for suspicious or unauthorized execution of commands like:

  • /config set channels.<provider>.accounts.<id> ...
  • config-backed /allowlist ... --config --account <id>

Monitoring logs for these commands issued by accounts without configWrites permissions on the targeted accounts can help detect attempts to exploit this vulnerability.


What immediate steps should I take to mitigate this vulnerability?

The recommended immediate mitigation is to upgrade OpenClaw to version 2026.3.11 or later, where the vulnerability has been fixed by enforcing proper authorization checks against both the origin account scope and each resolved target scope.

Additionally, ambiguous root and collection writes from channel commands are now rejected unless the caller has operator.admin privileges, so ensuring proper privilege management is also important.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthorized modification of protected configuration settings across sibling accounts despite intended policy restrictions. Such unauthorized integrity modifications could potentially lead to non-compliance with standards and regulations that require strict access controls and protection of configuration integrity, such as GDPR and HIPAA.

By bypassing account-scoped authorization policies, the vulnerability undermines the enforcement of access controls, which are critical for maintaining data security and privacy compliance.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart