<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Chat-Command-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/chat-command-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 21:25:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/chat-command-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw ACP Chat Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-06-openclaw-acp-bypass/</link><pubDate>Thu, 26 Mar 2026 21:25:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-openclaw-acp-bypass/</guid><description>A vulnerability in the openclaw npm package before version 2026.3.22 allowed mutating internal ACP chat commands without requiring operator.admin scope enforcement, potentially allowing unauthorized control-plane actions.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> npm package, versions prior to 2026.3.22, contained a vulnerability where internal ACP (Admin Control Panel) chat commands could be mutated without proper <code>operator.admin</code> scope enforcement. This flaw could be exploited by an attacker to bypass intended security controls and execute unauthorized administrative actions within the OpenClaw application. The vulnerability was reported by @tdjackey and patched in version 2026.3.22. Defenders should ensure they are running version 2026.3.22 or later to mitigate this risk. The scope of impact is limited to systems running vulnerable versions of the <code>openclaw</code> package.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of OpenClaw running a version prior to 2026.3.22.</li>
<li>Attacker crafts a malicious chat command intended to interact with the ACP.</li>
<li>The malicious command bypasses the intended <code>operator.admin</code> scope check due to the vulnerability.</li>
<li>The crafted command is sent to the OpenClaw application via the chat interface.</li>
<li>The vulnerable code in <code>src/auto-reply/reply/commands-acp.ts</code> processes the command without proper authorization.</li>
<li>The command execution results in the mutation of internal ACP configurations or data.</li>
<li>Attacker leverages the mutated configurations to gain further control over the OpenClaw application or its environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow an attacker to perform unauthorized administrative actions within the OpenClaw application. This may include modifying application settings, accessing sensitive data, or disrupting services. The severity of the impact depends on the specific ACP commands that are exposed and the attacker&rsquo;s ability to chain together multiple commands for greater effect.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> npm package to version 2026.3.22 or later to apply the fix described in the advisory (see Affected Packages / Versions).</li>
<li>Monitor chat command inputs for unusual syntax or attempts to access administrative functionalities to detect potential exploitation attempts (use network or application logs).</li>
<li>Review and audit existing OpenClaw configurations for any unauthorized modifications that may have occurred due to this vulnerability.</li>
<li>Implement input validation and sanitization on all chat command inputs to prevent command injection attacks.</li>
<li>Deploy the Sigma rule provided to detect attempts to use ACP commands without proper authorization (see &ldquo;OpenClaw ACP Command Execution Without Admin Scope&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>acp</category><category>chat-command-injection</category><category>vulnerability</category></item></channel></rss>