Description
OpenClaw before 2026.3.28 contains an agentic consent bypass vulnerability allowing LLM agents to silently disable execution approval via config.patch parameter. Remote attackers can exploit this to bypass security controls and execute unauthorized operations without user consent.
Problem types
Product status
Any version before 2026.3.28
2026.3.28 (semver)
Credits
Edward-x (@YLChen-007)
References
github.com/...enclaw/security/advisories/GHSA-v3qc-wrwx-j3pw (GitHub Security Advisory (GHSA-v3qc-wrwx-j3pw))
github.com/...ommit/76411b2afc4ae721e36c12e0ea24fd23e2fed61e (Patch Commit)
www.vulncheck.com/...agentic-consent-bypass-via-config-patch (VulnCheck Advisory: OpenClaw < 2026.3.28 - Agentic Consent Bypass via config.patch)