<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-43566 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-43566/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 12:16:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-43566/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Privilege Escalation via Untrusted Webhook Wake Events (CVE-2026-43566)</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-privesc/</link><pubDate>Tue, 05 May 2026 12:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-privesc/</guid><description>OpenClaw versions 2026.4.7 before 2026.4.14 contain a privilege escalation vulnerability (CVE-2026-43566) where heartbeat owner downgrade logic skips webhook wake events carrying untrusted content, allowing attackers to preserve owner-like execution context.</description><content:encoded><![CDATA[<p>OpenClaw versions 2026.4.7 through 2026.4.13 are vulnerable to a privilege escalation flaw, identified as CVE-2026-43566. This vulnerability stems from a failure in the heartbeat owner downgrade logic, which incorrectly skips webhook wake events that contain untrusted content. By exploiting this flaw, a malicious actor can craft and send untrusted webhook wake events, effectively maintaining an elevated, owner-like execution context even when the system should have downgraded privileges. This could allow unauthorized access and control within the OpenClaw environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable OpenClaw instance running versions 2026.4.7 - 2026.4.13.</li>
<li>The attacker crafts a malicious webhook wake event containing untrusted content.</li>
<li>The attacker sends the malicious webhook wake event to the targeted OpenClaw instance.</li>
<li>The OpenClaw instance receives the webhook wake event.</li>
<li>Due to the flawed heartbeat owner downgrade logic, the event is processed without proper privilege downgrading.</li>
<li>The attacker&rsquo;s process or script continues to execute with the privileges of the owner, rather than a more restricted user.</li>
<li>The attacker leverages the elevated privileges to access sensitive data or execute unauthorized commands.</li>
<li>The attacker maintains persistent access or further escalates privileges within the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-43566 allows attackers to bypass intended security controls and gain unauthorized access to sensitive resources within the OpenClaw environment. This privilege escalation could lead to data breaches, system compromise, and other malicious activities. The number of affected installations is currently unknown, but any OpenClaw instance running a vulnerable version is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.14 or later to patch CVE-2026-43566.</li>
<li>Implement input validation and sanitization for all webhook wake events to prevent the injection of untrusted content.</li>
<li>Monitor OpenClaw logs for suspicious webhook activity and unexpected privilege escalations.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Webhook Activity&rdquo; to identify potentially malicious webhook events.</li>
<li>Consider using a Web Application Firewall (WAF) to filter malicious requests, potentially blocking crafted webhook events before they reach the OpenClaw instance.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>privilege-escalation</category><category>webhook</category><category>cve-2026-43566</category></item></channel></rss>