#VU125130 Authorization bypass through user-controlled key in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to disclose sensitive information and modify authorization state across accounts.
The vulnerability exists due to incorrect authorization in the /allowlist --store account-scoping logic when processing allowlist store updates. A remote user can add a sender allowlist entry for one account to make it apply to the default account and disclose sensitive information and modify authorization state across accounts.
Exploitation requires the ability to run /allowlist edits, and legacy unscoped allowlist entries are merged into the default account.