OpenClaw versions 2026.3.7 before 2026.3.11 contain an authorization bypass vulnerability where plugin subagent routes execute gateway methods through a synthetic operator client with broad administrative scopes. Remote unauthenticated requests to plugin-owned routes can invoke runtime.subagent methods to perform privileged gateway actions including session deletion and agent execution.
| Vendor | Product | Versions |
|---|---|---|
| openclaw | openclaw | 2026.3.7 |
Updated affected versions to include 2026.3.10, changed severity to MEDIUM, and noted that no exploit is available.
Initial creation