CVE-2026-32916: OpenClaw: Plugin subagent routes could bypass gateway authorization with synthetic admin scopes
(updated )
In affected versions of openclaw, the plugin subagent runtime dispatched gateway methods through a synthetic operator client that always carried broad administrative scopes. Plugin-owned HTTP routes using auth: "plugin" could therefore trigger admin-only gateway actions without normal gateway authorization.
References
- github.com/advisories/GHSA-xw77-45gv-p728
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/releases/tag/v2026.3.11
- github.com/openclaw/openclaw/security/advisories/GHSA-xw77-45gv-p728
- nvd.nist.gov/vuln/detail/CVE-2026-32916
- www.vulncheck.com/advisories/openclaw-authorization-bypass-in-plugin-subagent-routes-via-synthetic-admin-scopes
Code Behaviors & Features
Detect and mitigate CVE-2026-32916 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →