Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.1

OpenClaw: Unauthorized Admin Changes to Browser Profiles

GHSA-vmhq-cqm9-6p7q
Summary

Authenticated users with limited access can make changes to browser profiles and store malicious remote connections without proper authorization. This affects OpenClaw versions 2026.3.8 and earlier. Update to version 2026.3.11 or later to fix the issue.

What to do
  • Update openclaw to version 2026.3.11.
Affected software
VendorProductAffected versionsFix available
– openclaw <= 2026.3.8 2026.3.11
Original title
OpenClaw: `browser.request` let `operator.write` persist admin-only browser profile changes
Original description
### Summary

An authorization mismatch in the gateway let an authenticated caller with only `operator.write` use `browser.request` to reach browser profile management routes that persist configuration to disk. In practice, this exposed an admin-only configuration write primitive through `/profiles/create`.

### Impact

A write-scoped operator could create or modify browser profiles and store attacker-chosen remote CDP endpoints without holding `operator.admin`.

### Affected versions

`openclaw` `<= 2026.3.8`

### Patch

Fixed in `openclaw` `2026.3.11` and included in later releases such as `2026.3.12`. Browser profile creation now requires the correct admin boundary, and regression tests cover the write-vs-admin authorization split.
ghsa CVSS3.1 7.1
Vulnerability type
CWE-863 Incorrect Authorization
Published: 13 Mar 2026 · Updated: 14 Mar 2026 · First seen: 13 Mar 2026