CVE-2026-41298: OpenClaw: Read-scoped identity-bearing HTTP clients could kill sessions via /sessions/:sessionKey/kill
(updated )
Before OpenClaw 2026.4.2, POST /sessions/:sessionKey/kill did not enforce write scopes in identity-bearing HTTP modes. A caller limited to read-only operator scopes could still terminate a running subagent session.
References
- github.com/advisories/GHSA-5hff-46vh-rxmw
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/54a0878517167c6e49900498cf77420dadb74beb
- github.com/openclaw/openclaw/security/advisories/GHSA-5hff-46vh-rxmw
- nvd.nist.gov/vuln/detail/CVE-2026-41298
- www.vulncheck.com/advisories/openclaw-authorization-bypass-in-session-termination-endpoint
Code Behaviors & Features
Detect and mitigate CVE-2026-41298 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →