This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: OpenClaw's plugin subagent routing allows a synthetic operator client with broad admin scopes to execute gateway methods.β¦
π¦ **Affected**: **OpenClaw** (Product by OpenClaw). Specifically, versions **prior to 2026.3.11**. If you are running 2026.3.7 or earlier, you are at risk.
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: Hackers can bypass authentication checks.β¦
β‘ **Exploitation Threshold**: **LOW**. CVSS Vector: `AV:N/AC:L/PR:N/UI:N`. No Authentication (PR:N) required. No User Interaction (UI:N) needed. Attack Vector is Network (AV:N). It is easy to exploit remotely.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exploit**: **No**. The `pocs` array is empty. While there are third-party advisories (GitHub GHSA, VulnCheck), there is no confirmed public Proof-of-Concept (PoC) or wild exploitation code available yet.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Check your OpenClaw version. If it is **< 2026.3.11**, you are vulnerable. Look for configurations involving **plugin subagent routes** and **synthetic operator clients** with broad admin scopes.
Q8Is it fixed officially? (Patch/Mitigation)
β **Official Fix**: **Yes**. The vulnerability is fixed in version **2026.3.11** and later. Upgrade immediately to the patched version to resolve the authorization bypass issue.
Q9What if no patch? (Workaround)
π **No Patch Workaround**: If you cannot upgrade, restrict the scopes of **synthetic operator clients**. Ensure they do not have **broad admin scopes** that can route to gateway methods via plugin subagents.β¦