Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2568 articles · 106280 vulns · 38/41 feeds (7d)
← Back to list
7.7
CVE-2026-32916EXPLOITEDPATCHED
openclaw · openclaw

OpenClaw 2026.3.7 < 2026.3.11 - Authorization Bypass in Plugin Subagent Routes via Synthetic Admin Scopes

Description

OpenClaw versions 2026.3.7 before 2026.3.11 contain an authorization bypass vulnerability where plugin subagent routes execute gateway methods through a synthetic operator client with broad administrative scopes. Remote unauthenticated requests to plugin-owned routes can invoke runtime.subagent methods to perform privileged gateway actions including session deletion and agent execution.

Affected Products

VendorProductVersions
openclawopenclaw2026.3.7

References

  • https://github.com/openclaw/openclaw/security/advisories/GHSA-xw77-45gv-p728(third-party-advisory)
  • https://www.vulncheck.com/advisories/openclaw-authorization-bypass-in-plugin-subagent-routes-via-synthetic-admin-scopes(third-party-advisory)

Related News (1 articles)

Tier C
VulDB10h ago
CVE-2026-32916 | OpenClaw up to 2026.3.10 privileges assignment (GHSA-xw77-45gv-p728)
→ No new info (linked only)
CVSS 3.17.7 NONE
CISA KEV❌ No
Actively exploited✅ Yes
Patch available2026.3.11
CWECWE-266
PublishedMar 31, 2026
Last enriched9h agov2
Trending Score43
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

NONECVE-2026-34504EXP
OpenClaw < 2026.3.28 - Server-Side Request Forgery via Unguarded Image Download in fal Provider
Trending: 59
NONECVE-2026-33580EXP
OpenClaw < 2026.3.28 - Brute Force Attack via Missing Rate Limiting on Webhook Shared Secret Authentication
Trending: 53
NONECVE-2026-33579EXP
OpenClaw < 2026.3.28 - Privilege Escalation via Missing Caller Scope Validation in Device Pair Approval
Trending: 53
NONECVE-2026-32917EXP
OpenClaw < 2026.3.13 - Remote Command Injection via Unsanitized iMessage Attachment Paths in SCP
Trending: 52
NONECVE-2026-34509EXP
OpenClaw < 2026.3.8 - Sender Allowlist Bypass in Microsoft Teams Plugin via Route Allowlist Configuration
Trending: 48

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Mar 31, 2026
Discovered by ZDM
Mar 31, 2026
Updated: affectedVersions, severity, activelyExploited
Mar 31, 2026
Actively Exploited
Mar 31, 2026
Patch Available
Mar 31, 2026

Version History

v2
Last enriched 9h ago
v2Tier C9h ago

Updated affected versions to include 2026.3.10, changed severity to MEDIUM, and noted that no exploit is available.

affectedVersionsseverityactivelyExploited
via VulDB
v110h ago

Initial creation