Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 29 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing write-scoped callers to reach admin-only session reset logic. Attackers with operator.write scope can issue agent requests containing /new or /reset slash commands to reset targeted conversation state without holding operator.admin privileges. | |
| Title | OpenClaw < 2026.3.11 - Unauthorized Session Reset via agent Slash Commands | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-863 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-01T15:31:33.426Z
Reserved: 2026-03-16T21:19:31.965Z
Link: CVE-2026-32919
No data.
Status : Analyzed
Published: 2026-03-29T13:17:00.380
Modified: 2026-03-31T18:08:30.527
Link: CVE-2026-32919
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:58:25Z