CVE-2026-32976

OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing channel commands to mutate protected sibling-account configuration despite configWrites restrictions. Attackers with authorized access on one account can execute channel commands like /config set channels.<provider>.accounts.<id> to modify configuration on target accounts with configWrites: false.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

02 Apr 2026, 14:13

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-8jhh-jcqg-mj5p - () https://github.com/openclaw/openclaw/security/advisories/GHSA-8jhh-jcqg-mj5p - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-account-scoped-configwrites-policy-bypass-via-channel-commands - () https://www.vulncheck.com/advisories/openclaw-account-scoped-configwrites-policy-bypass-via-channel-commands - Third Party Advisory
First Time Openclaw openclaw
Openclaw

31 Mar 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 12:16

Updated : 2026-04-02 14:13


NVD link : CVE-2026-32976

Mitre link : CVE-2026-32976

CVE.ORG link : CVE-2026-32976


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-639

Authorization Bypass Through User-Controlled Key