#VU125218 Improper privilege management in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to modify persistent channel authorization policy.
The vulnerability exists due to improper privilege management in the /allowlist command handler when processing /allowlist add or remove commands through the chat.send gateway method. A remote user can send a specially crafted chat.send request to modify persistent channel authorization policy.
The issue affects internal gateway callers because chat.send creates a command-authorized internal context, allowing an operator.write-scoped client to reach config-backed allowlist writes that are intended to be reserved for operator.admin.