GHSA-m5jp-p3r5-mfqp: Duplicate Advisory: OpenClaw: Gateway Plugin Subagent Fallback `deleteSession` Uses Synthetic `operator.admin`
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-h4jx-hjr3-fhgc. This link is maintained to preserve external references.
Original Description
OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in the gateway plugin subagent fallback deleteSession function that uses a synthetic operator.admin runtime scope. Attackers can exploit this by triggering session deletion without a request-scoped client to execute privileged operations with unintended administrative scope.
References
- github.com/advisories/GHSA-m5jp-p3r5-mfqp
- github.com/openclaw/openclaw/commit/b5d785f1a59a56c3471f2cef328f7c9a6c15f3e7
- github.com/openclaw/openclaw/security/advisories/GHSA-h4jx-hjr3-fhgc
- nvd.nist.gov/vuln/detail/CVE-2026-35645
- www.vulncheck.com/advisories/openclaw-privilege-escalation-via-synthetic-operator-admin-in-deletesession
Code Behaviors & Features
Detect and mitigate GHSA-m5jp-p3r5-mfqp with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →