Description
OpenClaw before 2026.3.31 contains a session visibility bypass vulnerability where the session_status function fails to enforce configured tools.sessions.visibility restrictions for unsandboxed invocations. Attackers can invoke session_status without sandbox constraints to bypass session-policy controls and access restricted session information.
Problem types
CWE-863: Incorrect Authorization
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
tdjackey
References
github.com/...enclaw/security/advisories/GHSA-fwjq-xwfj-gv75 (GitHub Security Advisory (GHSA-fwjq-xwfj-gv75))
github.com/...ommit/4d369a3400dc9b737fbe8daa63f09d909ce7beb8 (Patch Commit)
www.vulncheck.com/...ssion-status-in-unsandboxed-invocations (VulnCheck Advisory: OpenClaw < 2026.3.31 - Session Visibility Bypass via session_status in Unsandboxed Invocations)