This advisory has been withdrawn because it is a duplicate of GHSA-xw77-45gv-p728. This link is maintained to preserve external references.
OpenClaw versions 2026.3.7 before 2026.3.11 contain an authorization bypass vulnerability where plugin subagent routes execute gateway methods through a synthetic operator client with broad administrative scopes. Remote unauthenticated requests to plugin-owned routes can invoke runtime.subagent methods to perform privileged gateway actions including session deletion and agent execution.
{
"cwe_ids": [
"CWE-266"
],
"github_reviewed_at": "2026-04-06T22:49:20Z",
"nvd_published_at": "2026-03-31T12:16:28Z",
"severity": "CRITICAL",
"github_reviewed": true
}