TopVuln

High-risk vulnerability digests

CVE-2026-32051

  • HIGH

Details

CVSS v3
8.8
CVSS v4
8.7
NVD published
2026-03-21 01:17:08
Affected versions
OpenClaw versions prior to 2026.3.1
Summary
This vulnerability affects OpenClaw deployments using scoped authentication tokens. An authorization mismatch allows authenticated callers with the operator.write scope to invoke privileged owner-only functions for control plane operations. Attackers can exploit this flaw to perform administrative actions beyond their intended permission level by bypassing inconsistent access checks during agent execution.
Remediation
Upgrade OpenClaw to version 2026.3.1 or later to fix the inconsistent access gating issue. Review all existing scoped token permissions to enforce the principle of least privilege for all authenticated users in your deployment.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.