Description
OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the chat.send endpoint that allows write-scoped gateway callers to persist admin-only verboseLevel session overrides. Attackers can exploit the /verbose parameter to bypass access controls and expose sensitive reasoning or tool output intended to be restricted to administrators.
Problem types
CWE-863: Incorrect Authorization
Product status
Any version before 2026.3.28
2026.3.28 (semver)
Credits
Peng Zhou (@zpbrent)
References
github.com/...enclaw/security/advisories/GHSA-5h2w-qmfp-ggp6 (GitHub Security Advisory (GHSA-5h2w-qmfp-ggp6))
www.vulncheck.com/...alation-via-chat-send-verbose-parameter (VulnCheck Advisory: OpenClaw < 2026.3.28 - Privilege Escalation via chat.send /verbose Parameter)