Description
OpenClaw before 2026.4.10 contains an authorization bypass vulnerability allowing operator.write message-tool paths to access Matrix profile persistence requiring admin-level authority. Attackers can exploit insufficient access controls to mutate persistent profile configuration through non-owner message-tool runs.
Problem types
Product status
Any version before 2026.4.10
2026.4.10 (semver)
Credits
Peng Zhou (@zpbrent)
References
github.com/...enclaw/security/advisories/GHSA-7jp6-r74r-995q (GitHub Security Advisory (GHSA-7jp6-r74r-995q))
github.com/...ommit/fe0f686c9228fffcec6de4011da45e69a6e23e54 (Patch Commit)
www.vulncheck.com/...access-via-operator-write-message-tools (VulnCheck Advisory: OpenClaw < 2026.4.10 - Unauthorized Matrix Profile Config Persistence Access via operator.write Message Tools)