CVE-2026-35636 PUBLISHED

OpenClaw 2026.3.11 < 2026.3.25 - Session Isolation Bypass via sessionId Resolution

Assigner: VulnCheck
Reserved: 04.04.2026 Published: 09.04.2026 Updated: 09.04.2026

OpenClaw versions 2026.3.11 through 2026.3.24 contain a session isolation bypass vulnerability where session_status resolves sessionId to canonical session keys before enforcing visibility checks. Sandboxed child sessions can exploit this to access parent or sibling sessions that should be blocked by explicit sessionKey restrictions.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 7.1

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 2026.3.11 to * (excl.)

Credits

  • Nathan (@nexrin) reporter
  • KeenSecurityLab finder

References

Problem Types

  • CWE-696: Incorrect Behavior Order CWE