#VU125172 Improper access control in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to reset administrative sessions.
The vulnerability exists due to improper access control in the Gateway agent RPC handler in src/gateway/server-methods/agent.ts when processing /reset or /new messages with an explicit sessionKey. A remote user can send a specially crafted RPC message to reset administrative sessions.
The issue occurs because this path does not enforce the operator.admin guard required by the direct sessions.reset RPC.