PT-2026-28497 · Openclaw · Openclaw
Tdjackey
·
Published
2026-03-29
·
Updated
2026-03-29
·
CVE-2026-33573
CVSS v3.1
8.8
High
| AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
OpenClaw versions prior to 2026.3.11
Description
OpenClaw contains an authorization bypass issue in the gateway agent RPC. Authenticated operators possessing
operator.write permission can override workspace boundaries by manipulating the spawnedBy and workspaceDir values. This allows remote operators to bypass configured workspace restrictions and execute arbitrary file and exec operations from any process-accessible directory. The issue affects the gateway agent RPC functionality.Recommendations
Update OpenClaw to version 2026.3.11 or later.
Fix
Exposure of Resource to Wrong Sphere
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw