OpenClaw before 2026.3.24 contains an incorrect authorization vulnerability in the POST /reset-profile endpoint that allows authenticated callers with operator.write access to browser.request to bypass profile mutation restrictions. Attackers can invoke POST /reset-profile through the browser.request surface to stop the running browser, close Playwright connections, and move profile directories to Trash, crossing intended privilege boundaries.

Project Subscriptions

Vendors Products
Openclaw Subscribe
Openclaw Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xp9r-prpg-373r OpenClaw: `browser.request` still allows `POST /reset-profile` through the `operator.write` surface
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 10 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.24 contains an incorrect authorization vulnerability in the POST /reset-profile endpoint that allows authenticated callers with operator.write access to browser.request to bypass profile mutation restrictions. Attackers can invoke POST /reset-profile through the browser.request surface to stop the running browser, close Playwright connections, and move profile directories to Trash, crossing intended privilege boundaries.
Title OpenClaw < 2026.3.24 - Incorrect Authorization in POST /reset-profile via browser.request
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}

cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-10T16:59:30.616Z

Reserved: 2026-04-04T12:31:23.534Z

Link: CVE-2026-35653

cve-icon Vulnrichment

Updated: 2026-04-10T16:59:26.033Z

cve-icon NVD

Status : Received

Published: 2026-04-10T17:17:06.170

Modified: 2026-04-10T17:17:06.170

Link: CVE-2026-35653

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses