CVE-2026-35636
Session Isolation Bypass in OpenClaw Enables Unauthorized Session Access
Publication date: 2026-04-09
Last updated on: 2026-04-16
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | From 2026.3.11 (inc) to 2026.3.25 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-696 | The product performs multiple related behaviors, but the behaviors are performed in the wrong order in ways that may produce resultant weaknesses. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenClaw versions 2026.3.11 through 2026.3.24 and is a session isolation bypass. The issue arises because the session_status function resolves sessionId to canonical session keys before enforcing visibility checks. As a result, sandboxed child sessions can exploit this flaw to access parent or sibling sessions that should normally be blocked by explicit sessionKey restrictions.
How can this vulnerability impact me? :
The vulnerability allows sandboxed child sessions to bypass session isolation and access other sessions, such as parent or sibling sessions, which should be restricted. This can lead to unauthorized access to sensitive session data, potentially compromising confidentiality. According to the CVSS v3.1 score of 6.5, the impact is primarily on confidentiality with no impact on integrity or availability.