OpenClaw: Gateway HTTP Session History Route Bypasses Operator Read Scope
Moderate severity
GitHub Reviewed
Published
Mar 26, 2026
in
openclaw/openclaw
•
Updated Apr 10, 2026
Description
Published to the GitHub Advisory Database
Mar 29, 2026
Reviewed
Mar 29, 2026
Last updated
Apr 10, 2026
Summary
Gateway HTTP Session History Route Bypasses Operator Read Scope
Affected Packages / Versions
openclaw<= 2026.3.242026.3.252026.3.24Details
The HTTP
/sessions/:sessionKey/historyroute previously authenticated bearer tokens but skipped the sameoperator.readcheck used bychat.historyover WebSocket. Commit1c45123231516fa50f8cf8522ba5ff2fb2ca7aeamakes HTTP callers declare operator scopes and rejects history reads that do not includeoperator.read.Verified vulnerable on tag
v2026.3.24and fixed onmainby commit1c45123231516fa50f8cf8522ba5ff2fb2ca7aea.Fix Commit(s)
1c45123231516fa50f8cf8522ba5ff2fb2ca7aeaReferences