Description
OpenClaw before 2026.4.2 fails to enforce write scopes on the POST /sessions/:sessionKey/kill endpoint in identity-bearing HTTP modes. Read-scoped callers can terminate running subagent sessions by sending requests to this endpoint, bypassing authorization controls.
Problem types
Product status
Any version before 2026.4.2
2026.4.2 (semver)
Credits
Ea001 (@EaEa0001)
References
github.com/...enclaw/security/advisories/GHSA-5hff-46vh-rxmw (GitHub Security Advisory (GHSA-5hff-46vh-rxmw))
github.com/...ommit/54a0878517167c6e49900498cf77420dadb74beb (Patch Commit)
www.vulncheck.com/...-bypass-in-session-termination-endpoint (VulnCheck Advisory: OpenClaw < 2026.4.2 - Authorization Bypass in Session Termination Endpoint)