Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.3

OpenClaw versions prior to 2026.2.25 allow unauthorized access to session status

CVE-2026-32050
Summary

Versions of OpenClaw before 2026.2.25 have a security issue that could let someone send unauthorized messages about a user's session status. This could be exploited by an attacker to access information they shouldn't have. Update to version 2026.2.25 or later to fix this issue.

Original title
OpenClaw versions prior to 2026.2.25 contain an access control vulnerability in signal reaction notification handling that allows unauthorized senders to enqueue status events before authorization ...
Original description
OpenClaw versions prior to 2026.2.25 contain an access control vulnerability in signal reaction notification handling that allows unauthorized senders to enqueue status events before authorization checks are applied. Attackers can exploit the reaction-only event path in event-handler.ts to queue signal reaction status lines for sessions without proper DM or group access validation.
nvd CVSS3.1 3.7
nvd CVSS4.0 6.3
Vulnerability type
CWE-863 Incorrect Authorization
Published: 21 Mar 2026 · Updated: 21 Mar 2026 · First seen: 21 Mar 2026