OpenClaw before 2026.4.10 contains an authorization bypass vulnerability allowing operator.write message-tool paths to access Matrix profile persistence requiring admin-level authority. Attackers can exploit insufficient access controls to mutate persistent profile configuration through non-owner message-tool runs.CreditsPeng Zhou (@zpbrent)Referenceshttps://github.com/openclaw/openclaw/security/advisories/GHSA-7jp6-r74r-995qhttps://github.com/openclaw/openclaw/commit/fe0f686c9228fffcec6de4011da45e69a6e23e54https://www.vulncheck.com/advisories/openclaw-unauthorized-matrix-profile-config-persistence-access-via-operator-write-message-tools