GHSA-r7vr-gr74-94p8

Suggest an improvement
Source
https://github.com/advisories/GHSA-r7vr-gr74-94p8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-r7vr-gr74-94p8/GHSA-r7vr-gr74-94p8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-r7vr-gr74-94p8
Published
2026-03-13T20:55:09Z
Modified
2026-03-13T21:46:15.305418Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
OpenClaw: Command-authorized non-owners could reach owner-only `/config` and `/debug` surfaces
Details

Summary

OpenClaw documented /config and /debug as owner-only commands, but the command handlers checked only whether the sender was command-authorized. A lower-trust sender who was intentionally allowed to run commands could still reach privileged configuration and debugging surfaces.

Impact

This allowed a non-owner sender to read or change privileged configuration that should have remained restricted to owners.

Affected versions

openclaw <= 2026.3.11

Patch

Fixed in openclaw 2026.3.12. Owner checks are now enforced for privileged command surfaces, and regression tests cover /config and /debug access control.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-285"
    ],
    "github_reviewed_at": "2026-03-13T20:55:09Z",
    "severity": "HIGH"
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.3.12

Database specific

last_known_affected_version_range
"<= 2026.3.11"
source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-r7vr-gr74-94p8/GHSA-r7vr-gr74-94p8.json"