Home

Description

OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability where clients with operator.write scope can approve or deny exec approval requests by sending the /approve chat command. The /approve command path invokes exec.approval.resolve through an internal privileged gateway client, bypassing the operator.approvals permission check that protects direct RPC calls.

PUBLISHED Reserved 2026-02-27 | Published 2026-03-05 | Updated 2026-03-06 | Assigner VulnCheck




HIGH: 7.2CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Problem types

Incorrect Authorization

Product status

Default status
unaffected

Any version before 2026.2.2
affected

Credits

Yue (Knox) Liu (@yueyueL) reporter

References

github.com/...enclaw/security/advisories/GHSA-mqpw-46fh-299h (GitHub Security Advisory (GHSA-mqpw-46fh-299h)) vendor-advisory

github.com/...ommit/efe2a464afcff55bb5a95b959e6bd9ec0fef086e (Patch Commit) patch

www.vulncheck.com/...ization-bypass-via-approve-chat-command (VulnCheck Advisory: OpenClaw < 2026.2.2 - Authorization Bypass via /approve Chat Command) third-party-advisory

cve.org (CVE-2026-28473)

nvd.nist.gov (CVE-2026-28473)

Download JSON