CVE-2026-35669
Privilege Escalation in OpenClaw Gateway-Authenticated HTTP Routes
Publication date: 2026-04-10
Last updated on: 2026-04-13
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.25 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-648 | The product does not conform to the API requirements for a function call that requires extra privileges. This could allow attackers to gain privileges by causing the function to be called incorrectly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenClaw versions before 2026.3.25 and involves a privilege escalation issue in gateway-authenticated plugin HTTP routes. Specifically, these routes incorrectly grant the operator.admin runtime scope to callers regardless of the scopes they were originally granted. This means attackers can bypass scope boundaries and gain elevated privileges.
As a result, attackers exploiting this vulnerability can perform unauthorized administrative actions that should normally be restricted.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves the incorrect assignment of the operator.admin runtime scope to gateway-authenticated plugin HTTP routes regardless of the caller's granted scopes. Detection would involve identifying if any OpenClaw instances are running versions prior to 2026.3.25 and if plugin HTTP routes authenticated via the gateway are improperly granting elevated privileges.
To detect this on your system, you can check the OpenClaw version to confirm if it is vulnerable. For example, run a command to query the OpenClaw version installed.
- Check OpenClaw version: `openclaw --version` or check the package version via your package manager.
Additionally, monitoring HTTP plugin routes for unauthorized administrative actions or unexpected privilege escalations could help detect exploitation attempts.
Since the vulnerability is related to runtime scope assignment in plugin HTTP routes, you might also review logs for any plugin HTTP requests that perform administrative actions without proper authorization.
No specific detection commands or scripts are provided in the available resources.
How can this vulnerability impact me? :
The impact of this vulnerability is significant because it allows attackers to escalate their privileges to an administrative level without proper authorization.
- Attackers can gain operator.admin runtime scope regardless of their original permissions.
- Unauthorized administrative actions can be performed, potentially compromising system integrity and security.
- This could lead to data breaches, system manipulation, or disruption of services.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
CVE-2026-35669 is a high-severity privilege escalation vulnerability that allows attackers to gain unauthorized administrative privileges by bypassing scope boundaries in OpenClaw's gateway-authenticated plugin HTTP routes.
Such unauthorized privilege escalation can lead to unauthorized access and administrative actions on sensitive data or system configurations, which may violate security requirements mandated by common standards and regulations like GDPR and HIPAA.
Specifically, the vulnerability undermines proper authorization controls, increasing the risk of data breaches or improper handling of protected information, thereby potentially impacting compliance with data protection and privacy regulations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate CVE-2026-35669, you should upgrade OpenClaw to version 2026.3.25 or later, where the vulnerability has been fixed.
The fix involves restricting the runtime scopes assigned to gateway-authenticated plugin HTTP routes to the minimal necessary privileges, specifically assigning only the WRITE_SCOPE instead of the overly permissive operator.admin scope.
This update prevents unauthorized privilege escalation by ensuring that gateway authentication controls access but does not grant unnecessary administrative runtime permissions.