Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 31 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing channel commands to mutate protected sibling-account configuration despite configWrites restrictions. Attackers with authorized access on one account can execute channel commands like /config set channels.<provider>.accounts.<id> to modify configuration on target accounts with configWrites: false. | |
| Title | OpenClaw < 2026.3.11 - Account-Scoped configWrites Policy Bypass via Channel Commands | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-31T15:38:38.564Z
Reserved: 2026-03-17T11:31:33.584Z
Link: CVE-2026-32976
Updated: 2026-03-31T15:38:34.849Z
Status : Analyzed
Published: 2026-03-31T12:16:29.470
Modified: 2026-04-02T14:13:04.040
Link: CVE-2026-32976
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:38:59Z