Description
OpenClaw versions 2026.4.5 before 2026.4.10 contain a privilege escalation vulnerability allowing write-scoped operators to modify persistent memory dreaming settings. Attackers with write-scoped gateway access can toggle admin-class configuration mutations through the /dreaming endpoint to escalate privileges.
Problem types
Product status
2026.4.5 (semver) before 2026.4.10
2026.4.10 (semver)
Credits
Peng Zhou (@zpbrent)
References
github.com/...enclaw/security/advisories/GHSA-5gjc-grvm-m88j (GitHub Security Advisory (GHSA-5gjc-grvm-m88j))
github.com/...ommit/6af17b39e11f5f35e23b7e5a5f71a7d0aa3c7310 (Patch Commit)
www.vulncheck.com/...ming-configuration-in-dreaming-endpoint (VulnCheck Advisory: OpenClaw 2026.4.5 < 2026.4.10 - Privilege Escalation via Memory Dreaming Configuration in /dreaming Endpoint)