CVE-2026-33573
Received Received - Intake
Authorization Bypass in OpenClaw Gateway Agent Enables Workspace Escape

Publication date: 2026-03-29

Last updated on: 2026-03-30

Assigner: VulnCheck

Description
OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in the gateway agent RPC that allows authenticated operators with operator.write permission to override workspace boundaries by supplying attacker-controlled spawnedBy and workspaceDir values. Remote operators can escape the configured workspace boundary and execute arbitrary file and exec operations from any process-accessible directory.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-29
Last Modified
2026-03-30
Generated
2026-05-07
AI Q&A
2026-03-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.11 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-668 The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated operators to bypass workspace boundaries and execute arbitrary file and execution operations from any accessible directory, leading to unauthorized access and potential exposure of sensitive data.

Such unauthorized access and potential data exposure could negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict controls on data confidentiality, integrity, and access.

Because the vulnerability enables high confidentiality, integrity, and availability risks, organizations using affected versions of OpenClaw may face challenges in meeting regulatory requirements for protecting sensitive information.


Can you explain this vulnerability to me?

CVE-2026-33573 is a high-severity authorization bypass vulnerability in OpenClaw versions before 2026.3.11. It exists in the gateway agent's RPC interface, where authenticated operators with operator.write permission can supply attacker-controlled values for the parameters spawnedBy and workspaceDir.

This manipulation allows these operators to bypass the intended workspace boundary restrictions, enabling them to escape the configured workspace confines.

As a result, attackers can perform arbitrary file and execution operations from any directory accessible by the process, potentially leading to unauthorized resource access and execution.


How can this vulnerability impact me? :

This vulnerability allows a remote authenticated operator with operator.write privileges to escape the configured workspace boundary and execute arbitrary file and execution operations from any directory accessible by the process.

  • Unauthorized access to files and resources outside the intended workspace.
  • Potential execution of arbitrary commands or code from unauthorized directories.
  • Significant risks to confidentiality, integrity, and availability of the system.
  • Possible disruption of component availability or unauthorized modification of data.

What immediate steps should I take to mitigate this vulnerability?

The recommended immediate step to mitigate this vulnerability is to upgrade OpenClaw to version 2026.3.11 or later.

The patch enforces the configured workspace boundary for agent runs regardless of any caller-supplied overrides, preventing unauthorized workspace boundary bypass.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the gateway agent RPC interface in OpenClaw versions prior to 2026.3.11, where an authenticated operator with operator.write permission can supply manipulated parameters to bypass workspace boundaries.

To detect exploitation attempts or presence of this vulnerability on your system, you should monitor RPC calls to the gateway agent for suspicious usage of the parameters `spawnedBy` and `workspaceDir` that deviate from expected values.

Since the vulnerability requires authenticated operator access, auditing logs for operator.write actions and unusual workspace boundary overrides can help identify potential exploitation.

Specific commands are not provided in the available resources, but general detection steps include:

  • Review gateway agent RPC logs for calls containing unexpected or attacker-controlled `spawnedBy` and `workspaceDir` parameter values.
  • Audit operator activity logs for unauthorized or unusual file and execution operations outside the configured workspace boundaries.
  • Use network monitoring tools to detect anomalous RPC traffic patterns targeting the gateway agent.

Upgrading OpenClaw to version 2026.3.11 or later is the recommended mitigation to prevent this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart