#VU125262 Improper access control in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to terminate a running subagent session.
The vulnerability exists due to improper access control in the POST /sessions/:sessionKey/kill endpoint when handling identity-bearing HTTP requests with read-only operator scopes. A remote user can send a crafted request to terminate a running subagent session.
This issue affects the HTTP scope boundary and allows a read-scoped caller to perform a write-class control-plane mutation.