<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35643 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35643/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 10 Apr 2026 17:17:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35643/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw WebView JavascriptInterface Vulnerability (CVE-2026-35643)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-webview-rce/</link><pubDate>Fri, 10 Apr 2026 17:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-webview-rce/</guid><description>OpenClaw before 2026.3.22 is vulnerable to arbitrary code execution due to an unvalidated WebView JavascriptInterface, allowing attackers to inject malicious instructions by invoking the canvas bridge from untrusted pages.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.3.22 are susceptible to a critical vulnerability (CVE-2026-35643) stemming from an unvalidated WebView JavascriptInterface. This flaw enables attackers to inject arbitrary instructions and execute malicious code within the context of the Android application. The vulnerability arises because untrusted web pages can exploit the canvas bridge, a component responsible for communication between the WebView and the native Android code. Successful exploitation allows an attacker to gain control over the application&rsquo;s resources and potentially the device itself. This is a severe risk for any application using OpenClaw, as it could lead to data theft, malware installation, or other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application utilizing a vulnerable version of OpenClaw (prior to 2026.3.22).</li>
<li>The attacker crafts a malicious web page containing JavaScript code designed to exploit the unvalidated WebView JavascriptInterface.</li>
<li>The victim unknowingly navigates to the attacker-controlled web page, likely through social engineering or malicious advertising.</li>
<li>The malicious JavaScript code on the page interacts with the vulnerable canvas bridge within the OpenClaw WebView.</li>
<li>The attacker injects arbitrary instructions through the canvas bridge, leveraging the lack of input validation.</li>
<li>These injected instructions are then executed within the Android application context, bypassing security restrictions.</li>
<li>The attacker gains unauthorized access to the application&rsquo;s resources, such as user data or device functionalities.</li>
<li>The attacker executes arbitrary code, potentially leading to data exfiltration, malware installation, or complete device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of CVE-2026-35643 in OpenClaw can lead to complete compromise of the Android application and potentially the device it is running on. This can result in data theft, unauthorized access to sensitive information, installation of malware, and other malicious activities. While the exact number of vulnerable applications is unknown, the widespread use of OpenClaw could potentially affect a large number of users. The vulnerability is particularly dangerous because it can be exploited remotely through a simple web page, making it easily accessible to attackers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.22 or later to patch CVE-2026-35643, as mentioned in the overview.</li>
<li>Implement input validation and sanitization on all data received through the WebView JavascriptInterface to prevent arbitrary code injection.</li>
<li>Deploy the Sigma rule to detect attempts to exploit the canvas bridge within OpenClaw (see &ldquo;Detect Suspicious WebView Bridge Usage&rdquo; rule).</li>
<li>Monitor web traffic for access to untrusted URLs from applications utilizing OpenClaw to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35643</category><category>rce</category><category>android</category></item></channel></rss>