Gateway HTTP Session History Route Bypasses Operator Read Scope
openclaw<= 2026.3.242026.3.252026.3.24The HTTP /sessions/:sessionKey/history route previously authenticated bearer tokens but skipped the same operator.read check used by chat.history over WebSocket. Commit 1c45123231516fa50f8cf8522ba5ff2fb2ca7aea makes HTTP callers declare operator scopes and rejects history reads that do not include operator.read.
Verified vulnerable on tag v2026.3.24 and fixed on main by commit 1c45123231516fa50f8cf8522ba5ff2fb2ca7aea.
1c45123231516fa50f8cf8522ba5ff2fb2ca7aea{
"github_reviewed": true,
"github_reviewed_at": "2026-03-29T15:46:40Z",
"cwe_ids": [
"CWE-639",
"CWE-863"
],
"severity": "MODERATE",
"nvd_published_at": null
}