#VU125200 Incorrect authorization in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to terminate sessions they do not own.
The vulnerability exists due to incorrect authorization in the HTTP /sessions/:sessionKey/kill route when handling bearer-authenticated requests. A remote user can send a crafted request to terminate sessions they do not own.
The affected route could reach the admin kill path without binding the action to requester ownership or caller-granted operator scopes.