Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.2

OpenClaw versions prior to 2026.2.2 allow unauthorized approval of requests

CVE-2026-28473 GHSA-mqpw-46fh-299h
Summary

If you're using OpenClaw versions before 2026.2.2, an attacker with limited permissions can approve or deny important requests that should require more permission. This could lead to unauthorized actions being taken. Update to version 2026.2.2 or later to fix this issue.

What to do
  • Update steipete openclaw to version 2026.2.2.
Affected software
VendorProductAffected versionsFix available
steipete openclaw <= 2026.2.2 2026.2.2
openclaw openclaw <= 2026.2.2 –
Original title
OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability where clients with operator.write scope can approve or deny exec approval requests by sending the /approve chat com...
Original description
OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability where clients with operator.write scope can approve or deny exec approval requests by sending the /approve chat command. The /approve command path invokes exec.approval.resolve through an internal privileged gateway client, bypassing the operator.approvals permission check that protects direct RPC calls.
nvd CVSS3.1 8.1
nvd CVSS4.0 7.2
Vulnerability type
CWE-863 Incorrect Authorization
CWE-269 Improper Privilege Management
Published: 5 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026