CVE-2026-32976
Authorization Bypass in OpenClaw Allows Unauthorized Account Configuration Changes
Publication date: 2026-03-31
Last updated on: 2026-04-02
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.11 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-32976 is an authorization bypass vulnerability in OpenClaw versions before 2026.3.11. It allows an attacker who has authorized access to one account to bypass restrictions that normally prevent them from modifying configuration settings of sibling accounts.
Specifically, the vulnerability arises because channel commands, such as /config set channels.<provider>.accounts.<id>, do not properly verify authorization against the target account's scope. This means an attacker can mutate protected configurations on other accounts even when those accounts have configWrites set to false.
The root cause is a failure to consistently enforce authorization checks on the target account when executing channel commands, leading to unauthorized integrity modifications of sibling account configurations.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker with access to one account to modify configuration settings of other sibling accounts without proper authorization.
Such unauthorized configuration changes can compromise the integrity of protected account settings, potentially leading to misconfigurations, security policy violations, or other unintended behaviors within your deployment.
Because the attacker does not need elevated privileges beyond authorized access to one account, and no user interaction is required, the risk of exploitation is significant in environments where multiple accounts coexist.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves unauthorized configuration changes via channel commands such as /config set channels.<provider>.accounts.<id>. To detect exploitation attempts on your system, monitor for usage of channel commands that modify sibling account configurations, especially commands targeting channels.<provider>.accounts.<id> paths.
You can look for suspicious or unauthorized execution of commands like:
- /config set channels.<provider>.accounts.<id> ...
- config-backed /allowlist ... --config --account <id>
Monitoring logs for these commands issued by accounts without configWrites permissions on the targeted accounts can help detect attempts to exploit this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The recommended immediate mitigation is to upgrade OpenClaw to version 2026.3.11 or later, where the vulnerability has been fixed by enforcing proper authorization checks against both the origin account scope and each resolved target scope.
Additionally, ambiguous root and collection writes from channel commands are now rejected unless the caller has operator.admin privileges, so ensuring proper privilege management is also important.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthorized modification of protected configuration settings across sibling accounts despite intended policy restrictions. Such unauthorized integrity modifications could potentially lead to non-compliance with standards and regulations that require strict access controls and protection of configuration integrity, such as GDPR and HIPAA.
By bypassing account-scoped authorization policies, the vulnerability undermines the enforcement of access controls, which are critical for maintaining data security and privacy compliance.