<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Openclaw — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/openclaw/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/openclaw/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw QQ Bot Media Download SSRF Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-ssrf/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-ssrf/</guid><description>OpenClaw before 2026.4.8 is vulnerable to server-side request forgery (SSRF) in QQ Bot media download paths, allowing attackers to bypass SSRF protections and access internal resources.</description><content:encoded><![CDATA[<p>OpenClaw, a QQ Bot platform, is susceptible to a server-side request forgery (SSRF) vulnerability. This flaw exists in versions prior to 2026.4.8 within the media download paths of the QQ Bot functionality. Specifically, the vulnerability allows attackers to bypass existing SSRF protections. By exploiting unprotected media fetch endpoints, malicious actors can potentially gain unauthorized access to internal resources and circumvent established allowlist policies. This vulnerability poses a significant risk to the confidentiality and integrity of systems and data accessible from the OpenClaw server. Successful exploitation can lead to information disclosure, denial of service, or even remote code execution on internal systems, depending on the accessible resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an OpenClaw instance running a version prior to 2026.4.8.</li>
<li>The attacker crafts a malicious URL targeting the QQ Bot media download functionality. This URL contains a payload designed to exploit the SSRF vulnerability.</li>
<li>The attacker injects the malicious URL into the QQ Bot&rsquo;s media download path, bypassing expected SSRF protections.</li>
<li>OpenClaw processes the crafted URL without proper validation, initiating a request to an attacker-controlled internal resource.</li>
<li>The OpenClaw server makes a request to the specified internal resource, potentially exposing sensitive information or triggering unintended actions.</li>
<li>The internal resource responds to the OpenClaw server, and the response is potentially relayed back to the attacker or used to further compromise the system.</li>
<li>The attacker gains unauthorized access to internal resources or sensitive data due to the successful SSRF attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-41914) can lead to the disclosure of sensitive information from internal systems, potentially affecting all users and services dependent on the compromised OpenClaw instance. The severity is amplified by the potential to bypass existing SSRF protections, increasing the attack surface and difficulty of detection. Impact ranges from information disclosure to potential compromise of other internal services, depending on the specific internal resources accessible from the OpenClaw server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.8 or later to patch the SSRF vulnerability (CVE-2026-41914).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious OpenClaw SSRF Attempt</code> to identify potential exploitation attempts targeting the vulnerable media download paths.</li>
<li>Implement strict network segmentation to limit the impact of a successful SSRF attack by restricting access to sensitive internal resources from the OpenClaw server.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-41914</category><category>openclaw</category></item><item><title>OpenClaw Arbitrary Directory Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-directory-deletion/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-directory-deletion/</guid><description>OpenClaw before 2026.4.2 is vulnerable to arbitrary directory deletion in mirror mode, enabling attackers to delete remote directories by manipulating remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.4.2 is susceptible to an arbitrary directory deletion vulnerability (CVE-2026-41383) when operating in mirror mode. An attacker with control over the OpenShell configuration paths, specifically <code>remoteWorkspaceDir</code> and <code>remoteAgentWorkspaceDir</code>, can trigger the deletion of unintended remote directory contents. This is achieved by manipulating these configuration values to point to sensitive directories. The subsequent mirror sync operation replaces the deleted contents with data from the attacker&rsquo;s workspace, leading to data loss and potential system compromise. This vulnerability allows an attacker to potentially wipe out important data on the remote end.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to the OpenClaw configuration.</li>
<li>The attacker modifies the <code>remoteWorkspaceDir</code> and/or <code>remoteAgentWorkspaceDir</code> configuration values to point to a target directory they wish to delete.</li>
<li>The attacker initiates a mirror sync operation.</li>
<li>OpenClaw, using the attacker-controlled path, connects to the remote system.</li>
<li>OpenClaw deletes the contents of the directory specified by the modified <code>remoteWorkspaceDir</code> or <code>remoteAgentWorkspaceDir</code>.</li>
<li>OpenClaw uploads the contents of the attacker&rsquo;s local workspace to the now-empty remote directory, effectively replacing the original data.</li>
<li>The targeted remote directory now contains the attacker&rsquo;s data instead of the original contents.</li>
<li>The attacker achieves arbitrary directory deletion and data replacement, potentially causing significant disruption and data loss.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to arbitrary deletion of files and directories on the remote system where OpenClaw is used in mirror mode. The impact includes potential data loss, service disruption, and the replacement of legitimate data with attacker-controlled content. Given the CVSS v3.1 score of 8.1, this vulnerability is considered high severity due to the potential for significant data integrity and availability impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.2 or later to remediate CVE-2026-41383.</li>
<li>Monitor OpenClaw configuration files for unauthorized modifications to <code>remoteWorkspaceDir</code> and <code>remoteAgentWorkspaceDir</code> using a file integrity monitoring system.</li>
<li>Implement strict access controls to OpenClaw configuration files to prevent unauthorized modification of these settings.</li>
<li>Deploy the Sigma rule to detect suspicious process execution related to modification of openclaw configuration files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-41383</category><category>directory-traversal</category><category>file-deletion</category><category>openclaw</category></item><item><title>OpenClaw Improper Trust Boundary Vulnerability (CVE-2026-41295)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-trust-boundary/</link><pubDate>Tue, 21 Apr 2026 00:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-trust-boundary/</guid><description>OpenClaw before 2026.4.2 contains an improper trust boundary vulnerability (CVE-2026-41295) allowing attackers to execute unintended code by cloning a workspace with a malicious plugin claiming a bundled channel id.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.4.2 is vulnerable to an improper trust boundary issue. This vulnerability allows an attacker to achieve in-process code execution by exploiting the way OpenClaw handles workspace channel shadows. Specifically, an attacker can clone a workspace and include a malicious plugin. This plugin claims a bundled channel ID, which results in the execution of untrusted code during the built-in channel setup and login process, even before the plugin is explicitly trusted by the user. This poses a significant risk as it bypasses normal trust mechanisms within OpenClaw.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker clones a legitimate OpenClaw workspace.</li>
<li>Attacker crafts a malicious plugin designed to exploit the trust boundary vulnerability.</li>
<li>The malicious plugin is configured to claim a bundled channel ID that OpenClaw uses for built-in channels.</li>
<li>The cloned workspace, including the malicious plugin, is distributed to a target user.</li>
<li>The target user opens the cloned workspace in a vulnerable version of OpenClaw (before 2026.4.2).</li>
<li>During the workspace loading and channel setup process, OpenClaw incorrectly trusts the malicious plugin due to the claimed channel ID.</li>
<li>The malicious plugin executes arbitrary code within the OpenClaw process.</li>
<li>The attacker gains control or compromises the user&rsquo;s OpenClaw session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41295 leads to arbitrary code execution within the OpenClaw application. An attacker can leverage this to potentially steal sensitive information, modify workspace data, or escalate privileges on the affected system. The vulnerability impacts all OpenClaw users running versions prior to 2026.4.2 who open a maliciously crafted workspace. The impact is severe, as it allows for immediate code execution without explicit user consent or trust of the malicious plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.2 or later to patch CVE-2026-41295.</li>
<li>Monitor for the creation and loading of OpenClaw plugins, specifically those claiming bundled channel IDs, using a process creation rule with a focus on command-line arguments.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted plugins within OpenClaw to mitigate the risk of malicious plugin execution.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>code-execution</category><category>trust-boundary</category><category>plugin</category></item><item><title>OpenClaw Webchat Media Embedding Local-Root Containment Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-local-root-bypass/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-local-root-bypass/</guid><description>A vulnerability in OpenClaw versions 2026.4.7 to before 2026.4.15 allows a crafted tool-result media reference to cause the host to attempt local file reads or Windows UNC/network path access, potentially disclosing files or network credentials.</description><content:encoded><![CDATA[<p>OpenClaw versions 2026.4.7 through 2026.4.14 are vulnerable to a local-root containment bypass in the webchat media embedding feature. This flaw allows a malicious actor to craft a tool-result media reference with a local file path or UNC path that bypasses the intended <code>localRoots</code> containment policy. The vulnerability resides in the handling of media paths during webchat media block preparation on the host side. Successful exploitation could lead to the disclosure of allowed host files or the exposure of network credentials on Windows systems. The issue was reported by @Kherrisan and patched in OpenClaw version 2026.4.15.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious tool-result that contains a media reference with a file path intended to bypass local-root containment (e.g., a path outside the allowed <code>localRoots</code>).</li>
<li>The user interacts with the malicious tool-result within the OpenClaw webchat interface.</li>
<li>The webchat media embedding functionality attempts to normalize the media reference.</li>
<li>Due to the vulnerability, the crafted file path bypasses the <code>localRoots</code> containment check.</li>
<li>The host system attempts to read the file from the specified path (either local or UNC).</li>
<li>If successful, the file content is potentially exposed. On Windows, the system might attempt to access a UNC path, potentially exposing network credentials.</li>
<li>The webchat media block is prepared with the (potentially exposed) file content.</li>
<li>Although the vulnerability is triggered host-side before the user sees the final rendered result, sensitive information could be leaked.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to the disclosure of sensitive files on the host system. On Windows systems, exploitation may result in the exposure of network credentials if a UNC path is accessed. While the severity is medium because exploitation depends on a tool-result media path reaching the webchat embedding path, the sink is a host-side file read before the user sees the rendered result. This impacts OpenClaw installations running versions 2026.4.7 through 2026.4.14.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.15 or later to patch the vulnerability. The fix hardens the webchat media path and shared media resolver, rejecting remote-host <code>file://</code> URLs and Windows network paths.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious OpenClaw UNC Path Access</code> to identify attempts to access UNC paths via OpenClaw.</li>
<li>Review the code changes in commits <code>1470de5d3e0970856d86cd99336bb8ada3fe87da</code>, <code>6e58f1f9f54bca1fea1268ec0ee4c01a2af03dde</code>, and <code>52ef42302ead9e183e6c8810e0a04ee4ef8ae9fc</code> to understand the implemented security measures in version 2026.4.15.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>openclaw</category><category>local-file-inclusion</category><category>unc-path</category></item><item><title>OpenClaw Environment Variable Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-openclaw-env-injection/</link><pubDate>Fri, 17 Apr 2026 21:54:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-openclaw-env-injection/</guid><description>The openclaw package versions prior to 2026.4.10 are vulnerable to environment variable injection, where the exec environment policy missed interpreter startup variables allowing operator-supplied environment overrides to influence downstream execution or network behavior, addressed in versions 2026.4.10 and later.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> package, a tool used within the npm ecosystem, was found to have a vulnerability affecting versions prior to 2026.4.10. This vulnerability stems from an inadequate environment variable denylist in the exec environment policy. Specifically, the policy failed to block high-risk interpreter startup variables such as <code>VIMINIT</code>, <code>EXINIT</code>, <code>LUA_INIT</code>, and <code>HOSTALIASES</code>. This oversight allowed malicious actors to potentially inject arbitrary environment variables, thereby influencing the behavior of downstream execution or network operations. The vulnerability was reported by @feiyang666 of Tencent zhuque Lab. The fix was implemented in version 2026.4.10 and later, with version 2026.4.14 containing the fix as well. This vulnerability allows for potential code execution or network manipulation through environment variables.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains control over an environment where the vulnerable <code>openclaw</code> package is utilized.</li>
<li>The attacker identifies that the <code>openclaw</code> version is prior to 2026.4.10.</li>
<li>The attacker injects a malicious environment variable, such as <code>VIMINIT</code>, <code>EXINIT</code>, <code>LUA_INIT</code>, or <code>HOSTALIASES</code>, into the system&rsquo;s environment.</li>
<li>The <code>openclaw</code> package executes a process that reads and utilizes environment variables without proper sanitization.</li>
<li>The injected environment variable overrides the intended behavior of the process. For example, <code>VIMINIT</code> can be used to execute arbitrary vim commands upon startup.</li>
<li>This execution leads to arbitrary code execution or modified network behavior, depending on the injected variable. For example, <code>HOSTALIASES</code> can redirect network requests to attacker-controlled servers.</li>
<li>The attacker achieves their objective, such as gaining unauthorized access, exfiltrating data, or causing denial of service.</li>
<li>The attacker leverages the compromised environment to propagate the attack further.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows for arbitrary code execution or network redirection by injecting malicious environment variables. Successful exploitation could lead to unauthorized access to sensitive data, system compromise, or denial-of-service conditions. The specific impact depends on the context in which <code>openclaw</code> is used and the permissions of the user running the affected process. The reported vulnerability has been fixed in <code>openclaw</code> version 2026.4.10 and later.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> package to version 2026.4.10 or later to remediate the vulnerability, as indicated in the advisory (<a href="https://github.com/advisories/GHSA-vfp4-8x56-j7c5">https://github.com/advisories/GHSA-vfp4-8x56-j7c5</a>).</li>
<li>Monitor process execution for the presence of environment variables being passed to child processes, focusing on <code>VIMINIT</code>, <code>EXINIT</code>, <code>LUA_INIT</code>, and <code>HOSTALIASES</code>. Implement the Sigma rule below to detect suspicious process execution involving these variables.</li>
<li>Implement a system-wide policy to restrict the modification of environment variables by non-administrative users.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>npm</category><category>openclaw</category><category>environment-variable-injection</category><category>vulnerability</category></item><item><title>OpenClaw Insufficient Access Control in Gateway Agent Session Reset (CVE-2026-35660)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-reset-vuln/</link><pubDate>Fri, 10 Apr 2026 17:50:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-reset-vuln/</guid><description>OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions by invoking /reset or /new messages with an explicit sessionKey, bypassing operator.admin requirements.</description><content:encoded><![CDATA[<p>OpenClaw, a yet-to-be-defined application, suffers from an insufficient access control vulnerability (CVE-2026-35660) affecting versions prior to 2026.3.23. The vulnerability exists within the Gateway agent&rsquo;s <code>/reset</code> endpoint.  An attacker possessing <code>operator.write</code> permissions can exploit this flaw to reset administrative sessions, circumventing the intended <code>operator.admin</code> requirement.  Specifically, the vulnerability allows attackers to invoke <code>/reset</code> or <code>/new</code> messages including an explicit <code>sessionKey</code> to manipulate arbitrary sessions. This could lead to unauthorized access and modification of sensitive system configurations, depending on the scope of the OpenClaw application. The vulnerability was disclosed on April 10, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized <code>operator.write</code> privileges within the OpenClaw application, potentially through account compromise or privilege escalation from another vulnerability.</li>
<li>The attacker crafts a malicious HTTP request targeting the Gateway agent&rsquo;s <code>/reset</code> endpoint.</li>
<li>The crafted request includes a specific <code>sessionKey</code> belonging to an administrative user.</li>
<li>Alternatively, the attacker could send a <code>/new</code> message containing the admin&rsquo;s <code>sessionKey</code>.</li>
<li>Due to the insufficient access control, the Gateway agent processes the request, incorrectly resetting the targeted admin session.</li>
<li>The administrative user is forcibly logged out of their session, disrupting their work.</li>
<li>The attacker could potentially hijack the reset session depending on implementation details.</li>
<li>The attacker could then use their elevated access to perform unauthorized actions, such as modifying critical system configurations or accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35660 allows attackers with <code>operator.write</code> privileges to reset arbitrary admin sessions in OpenClaw. This can lead to denial of service for legitimate administrators, and potentially allow the attacker to hijack the reset session or perform unauthorized actions, leading to data breaches or system compromise, depending on the application&rsquo;s functionalities and the scope of admin privileges. The severity is rated as high with a CVSS score of 8.1.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.23 or later to patch CVE-2026-35660.</li>
<li>Review and enforce strict access control policies for the OpenClaw application, ensuring that <code>operator.write</code> privileges are only granted to trusted users.</li>
<li>Monitor web server logs for suspicious requests to the <code>/reset</code> endpoint, especially those containing explicit <code>sessionKey</code> parameters and correlate with user roles.</li>
<li>Deploy the Sigma rule &ldquo;Detect OpenClaw Session Reset Attempt&rdquo; to detect exploitation attempts (see below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-35660</category><category>openclaw</category><category>access-control</category><category>privilege-escalation</category></item><item><title>OpenClaw Path Traversal Vulnerability (CVE-2026-35668)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-path-traversal/</link><pubDate>Fri, 10 Apr 2026 17:17:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-path-traversal/</guid><description>OpenClaw before 2026.3.24 is vulnerable to path traversal, allowing sandboxed agents to read arbitrary files from other agents' workspaces via manipulated URL parameters.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.3.24 are susceptible to a path traversal vulnerability (CVE-2026-35668) that compromises sandbox enforcement. This flaw allows a sandboxed agent to read arbitrary files from another agent&rsquo;s workspace by exploiting weaknesses in the handling of <code>mediaUrl</code> and <code>fileUrl</code> parameters. The vulnerability stems from incomplete parameter validation within the <code>normalizeSandboxMediaParams</code> function and the absence of <code>mediaLocalRoots</code> context, which enables attackers to bypass intended sandbox restrictions and access sensitive data, such as API keys and configuration files, located outside the agent&rsquo;s designated sandbox root. Successful exploitation allows unauthorized data access, potentially leading to lateral movement or data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an OpenClaw instance running a version prior to 2026.3.24.</li>
<li>The attacker crafts a malicious request containing either a <code>mediaUrl</code> or <code>fileUrl</code> parameter.</li>
<li>The crafted URL includes path traversal sequences (e.g., <code>../</code>) designed to navigate outside the intended sandbox directory.</li>
<li>The <code>normalizeSandboxMediaParams</code> function processes the URL but fails to adequately sanitize or normalize the path, due to insufficient validation.</li>
<li>The lack of proper <code>mediaLocalRoots</code> context during path resolution further contributes to the bypass.</li>
<li>The application attempts to access the file specified by the manipulated URL.</li>
<li>Due to the path traversal vulnerability, the application reads a file outside the intended sandbox root, potentially revealing sensitive information like API keys.</li>
<li>The attacker retrieves the contents of the targeted file, completing the unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35668 can lead to the disclosure of sensitive information, including API keys and configuration data, stored within other agents&rsquo; workspaces. This unauthorized access can enable attackers to perform lateral movement, escalate privileges, or exfiltrate valuable data. While specific victim counts are unavailable, any OpenClaw deployment running a vulnerable version is at risk. The impact is heightened in environments where OpenClaw agents handle sensitive data or manage critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.24 or later to remediate CVE-2026-35668 and address the underlying path traversal vulnerability.</li>
<li>Implement input validation and sanitization for all URL parameters, especially those related to file or media access, to prevent path traversal attacks.</li>
<li>Apply the provided Sigma rule to detect suspicious requests containing path traversal sequences in <code>mediaUrl</code> or <code>fileUrl</code> parameters within web server logs.</li>
<li>Review and strengthen sandbox configurations to ensure proper isolation between OpenClaw agents and restrict access to sensitive files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>openclaw</category></item><item><title>OpenClaw RCE via Build Tool Environment Variable Injection</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-openclaw-rce/</link><pubDate>Thu, 09 Apr 2026 14:22:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-openclaw-rce/</guid><description>OpenClaw versions prior to 2026.4.8 are vulnerable to remote code execution (RCE) via build tool environment variable injection due to missing denylist entries for HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS, allowing hostile environment variables to influence host exec commands.</description><content:encoded><![CDATA[<p>OpenClaw, a user-controlled local assistant, is vulnerable to a remote code execution (RCE) issue affecting versions prior to 2026.4.8. The vulnerability, identified as GHSA-cm8v-2vh9-cxf3, stems from missing denylist entries for environment variables that influence build tools. Specifically, HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS were not properly sanitized, allowing a malicious actor to inject arbitrary commands into the build process. This can lead to the execution of untrusted code on the host system. The vulnerability was reported by @boy-hack of Tencent zhuque Lab. The fix is available in version 2026.4.8 and commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable OpenClaw instance running a version prior to 2026.4.8.</li>
<li>The attacker crafts malicious environment variables, such as HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, or MAKEFLAGS, containing shell commands.</li>
<li>The attacker triggers a build process within OpenClaw that utilizes the affected environment variables. This could involve providing a specific input or interacting with OpenClaw in a way that initiates a build operation.</li>
<li>Due to the missing denylist, OpenClaw does not sanitize the malicious environment variables.</li>
<li>The build tool, influenced by the attacker-controlled environment variables, executes the injected shell commands.</li>
<li>The injected commands execute with the privileges of the OpenClaw process.</li>
<li>The attacker gains arbitrary code execution on the host system.</li>
<li>The attacker can now perform actions such as installing malware, exfiltrating data, or compromising other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the system running OpenClaw. This could lead to complete system compromise, including data theft, malware installation, and further lateral movement within the network. Given OpenClaw&rsquo;s nature as a user-controlled local assistant, the impact is primarily on individual user systems. However, in environments where OpenClaw is deployed more broadly, the vulnerability could be leveraged to compromise multiple machines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.8 or later to patch the vulnerability (see &ldquo;Affected Packages / Versions&rdquo;).</li>
<li>Monitor process creation events for unexpected processes spawned by OpenClaw or its build tool subprocesses (see rules below).</li>
<li>Implement additional input validation and sanitization measures to prevent environment variable injection in other applications.</li>
<li>Review and harden build processes to limit the influence of environment variables.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>environment-variable-injection</category><category>openclaw</category></item><item><title>OpenClaw Trust Model Vulnerability: System Prompt Channel Injection</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-trust-model/</link><pubDate>Thu, 09 Apr 2026 14:22:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-trust-model/</guid><description>OpenClaw versions 2026.4.2 and earlier are vulnerable to a trust model issue where authenticated wake hooks or mapped wake payloads can be promoted into the trusted System prompt channel, potentially leading to security vulnerabilities within the OpenClaw trust model.</description><content:encoded><![CDATA[<p>OpenClaw, a user-controlled local assistant, is susceptible to a vulnerability affecting its trust model. This vulnerability, present in versions 2026.4.2 and earlier, allows authenticated <code>/hooks/wake</code> calls and mapped <code>wake</code> payloads to be improperly promoted into the trusted <code>System:</code> prompt channel. This occurs because the application fails to correctly differentiate between trusted system events and untrusted user-supplied events. The issue was reported on April 9th, 2026, and addressed in version 2026.4.8. The vulnerability specifically impacts the OpenClaw trust model, which assumes a single-tenant environment; it is not applicable to multi-tenant service boundaries. Defenders need to ensure OpenClaw is updated to the patched version to mitigate potential security exploits within this trust model.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable OpenClaw instance running version 2026.4.2 or earlier.</li>
<li>Attacker authenticates to the OpenClaw instance.</li>
<li>Attacker crafts a malicious payload intended to be interpreted as a standard &ldquo;wake&rdquo; command.</li>
<li>Attacker sends a specially crafted <code>/hooks/wake</code> request or a mapped <code>wake</code> payload containing the malicious content.</li>
<li>Due to the vulnerability, OpenClaw incorrectly promotes the attacker-controlled payload into the trusted <code>System:</code> prompt channel.</li>
<li>The OpenClaw assistant processes the malicious payload within the <code>System:</code> context, granting it elevated privileges within the application&rsquo;s trust model.</li>
<li>The malicious payload executes arbitrary commands or actions within the OpenClaw environment as a trusted system component.</li>
<li>The attacker achieves their objective, which could involve data manipulation, unauthorized access to local resources, or other malicious activities within the scope of the OpenClaw assistant.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows an attacker to inject malicious commands into the trusted system prompt channel of OpenClaw. Successful exploitation could lead to unauthorized data access, modification, or execution of arbitrary code within the OpenClaw environment. While the advisory does not specify the number of affected users, any instance running OpenClaw version 2026.4.2 or earlier is vulnerable. The primary risk is the compromise of the user&rsquo;s local assistant and potentially the data it manages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.8 or later to remediate the vulnerability (reference: Affected Packages / Versions).</li>
<li>Monitor OpenClaw logs for suspicious activity related to the <code>/hooks/wake</code> endpoint (develop custom rules based on your OpenClaw logging configuration).</li>
<li>Deploy the Sigma rule provided in this brief to detect potential exploitation attempts by monitoring process execution following <code>/hooks/wake</code> requests.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>trust-model</category><category>system-prompt-injection</category><category>npm</category></item><item><title>OpenClaw TOCTOU Race Condition Leads to Sandbox Escape</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-sandbox-escape/</link><pubDate>Fri, 03 Apr 2026 03:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-sandbox-escape/</guid><description>A critical time-of-check time-of-use (TOCTOU) vulnerability in OpenClaw's remote file system bridge allows a sandbox escape by exploiting the delay between path validation and file reading, affecting versions up to 2026.3.28.</description><content:encoded><![CDATA[<p>OpenClaw versions up to and including 2026.3.28 contain a critical vulnerability related to how they handle remote file system operations within a sandboxed environment. Specifically, the <code>readFile</code> function in the remote file system bridge is susceptible to a Time-of-Check Time-of-Use (TOCTOU) race condition. This means that the application verifies the path of a file before reading it, but an attacker can potentially modify the file path in between the check and the read operation. The vulnerability was reported by AntAISecurityLab and patched in version 2026.3.31. Successful exploitation allows attackers to escape the sandbox, potentially leading to arbitrary code execution on the host system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a request to the OpenClaw application, specifying a file path within the allowed sandbox.</li>
<li>OpenClaw&rsquo;s <code>readFile</code> function receives the request and validates that the requested path is within the allowed sandbox.</li>
<li>After the path is validated, but before the file is read, the attacker leverages a race condition to modify the file path. This could be achieved by symlink replacement or other file system manipulation techniques.</li>
<li>The <code>readFile</code> function now attempts to read the file from the modified path, which could point to a location outside the intended sandbox.</li>
<li>The file from the attacker-controlled path is read, bypassing the initial security check.</li>
<li>OpenClaw processes the content of the file, potentially executing malicious code or leaking sensitive information, depending on the file&rsquo;s contents and the application&rsquo;s handling of it.</li>
<li>The attacker successfully escapes the sandbox, gaining unauthorized access to the host system&rsquo;s resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this TOCTOU vulnerability allows an attacker to bypass the intended security restrictions of the OpenClaw sandbox. This can lead to arbitrary code execution on the host system, potentially allowing the attacker to install malware, steal sensitive data, or pivot to other systems on the network. While the specific number of affected installations is unknown, all deployments of OpenClaw versions 2026.3.28 or earlier are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.31 or later to patch the vulnerability as indicated in the advisory.</li>
<li>Deploy the provided Sigma rule to detect attempts to exploit this TOCTOU vulnerability by monitoring file access patterns.</li>
<li>Enable file integrity monitoring (FIM) on critical system files to detect unauthorized modifications that could indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>openclaw</category><category>sandbox-escape</category><category>toctou</category></item><item><title>OpenClaw Incomplete Scope Clearing Allows Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-privesc/</link><pubDate>Fri, 03 Apr 2026 03:06:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-privesc/</guid><description>An incomplete fix in OpenClaw versions 2026.3.28 and earlier allows for operator.admin privilege escalation via trusted-proxy authentication mode, which is fixed in version 2026.3.31.</description><content:encoded><![CDATA[<p>A high-severity vulnerability exists in the OpenClaw npm package, specifically affecting versions 2026.3.28 and earlier. This vulnerability arises from an incomplete fix related to scope clearing within the trusted-proxy authentication mode. The flaw allows attackers to escalate their privileges to operator.admin, potentially gaining unauthorized access to sensitive data or system functionalities. The vulnerability was reported by @north-echo and patched in version 2026.3.31, with the fix committed on March 30, 2026. This issue is critical for organizations utilizing OpenClaw with trusted-proxy authentication, as it could lead to significant security breaches. Defenders should prioritize upgrading to version 2026.3.31 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OpenClaw instance running a vulnerable version (&lt;=2026.3.28) using trusted-proxy authentication.</li>
<li>Attacker gains initial access with limited privileges, potentially via compromised credentials or another vulnerability.</li>
<li>Attacker authenticates via the trusted proxy, declaring a set of operator scopes.</li>
<li>Due to the incomplete scope clearing, the attacker&rsquo;s declared operator scopes are not properly sanitized by the system.</li>
<li>The system incorrectly grants the attacker elevated privileges associated with the self-declared operator scopes.</li>
<li>Attacker exploits the elevated operator.admin privileges to access restricted resources or functionalities.</li>
<li>Attacker performs unauthorized actions, such as data modification, configuration changes, or lateral movement within the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to escalate their privileges to operator.admin within the OpenClaw environment. This could lead to unauthorized access to sensitive data, modification of critical system configurations, and potential disruption of services. The impact is especially significant for organizations that rely on OpenClaw for critical operations and have not yet upgraded to the patched version. The attacker could leverage the escalated privileges to perform a wide range of malicious activities, potentially compromising the entire system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.31 or later to remediate the vulnerability (Affected Packages / Versions).</li>
<li>Monitor OpenClaw logs for suspicious activity related to trusted-proxy authentication and privilege escalation (logsource: &ldquo;webserver&rdquo;, product: &ldquo;linux&rdquo;).</li>
<li>Implement strict access controls and regularly review user permissions to minimize the impact of potential privilege escalation attacks.</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts targeting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>web-application</category><category>openclaw</category></item><item><title>OpenClaw Arbitrary File Read and Credential Exfiltration Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-file-read/</link><pubDate>Fri, 03 Apr 2026 02:53:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-file-read/</guid><description>The openclaw package is vulnerable to arbitrary file read and credential exfiltration due to media local roots self-whitelisting in `appendLocalMediaParentRoots`, allowing a model to initiate arbitrary host file reads, potentially leading to credential exfiltration.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> npm package, versions 2026.3.28 and earlier, contains a vulnerability related to media local roots self-whitelisting in the <code>appendLocalMediaParentRoots</code> function. This flaw enables a malicious model to initiate arbitrary file reads on the host system. While the tool-fs root expansion requires prior configuration, the vulnerability can still be exploited, resulting in a narrower impact than a default-critical scenario. The vulnerability was reported by @tdjackey and patched in version 2026.3.31. Defenders should ensure they are running version 2026.3.31 or later of the <code>openclaw</code> package to mitigate the risk of arbitrary file read and potential credential exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious actor crafts or modifies an existing OpenClaw model.</li>
<li>The model includes instructions to trigger the <code>appendLocalMediaParentRoots</code> function within the <code>src/media/local-roots.ts</code> file.</li>
<li>Due to the self-whitelisting behavior, the function expands the allowed media parent directories, potentially including sensitive system directories.</li>
<li>The model leverages the expanded directory access to request the reading of arbitrary files on the host system.</li>
<li>The <code>openclaw</code> application processes the model&rsquo;s file read request without proper validation due to the bypassed whitelisting.</li>
<li>Sensitive files, such as configuration files or credential stores, are read by the application.</li>
<li>The extracted data, including credentials, are then potentially exfiltrated by the malicious model.</li>
<li>The attacker gains unauthorized access to sensitive data or systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the host system where the <code>openclaw</code> application is running. This can lead to the exfiltration of sensitive information, including credentials, API keys, or other confidential data. While the exact number of affected installations is unknown, any system running a vulnerable version of the <code>openclaw</code> package (&lt;=2026.3.28) is susceptible. The impact is narrowed because the tool-fs root expansion requires prior configuration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> npm package to version 2026.3.31 or later to remediate the vulnerability (reference: Affected Packages / Versions).</li>
<li>Implement input validation and sanitization to prevent arbitrary file paths from being processed by the <code>appendLocalMediaParentRoots</code> function (reference: <code>src/media/local-roots.ts</code>).</li>
<li>Deploy the Sigma rule to detect attempts to access sensitive files via the <code>openclaw</code> application (reference: Sigma rule below).</li>
<li>Review and restrict the tool-fs root expansion configuration to minimize the impact of potential exploitation (reference: Current Maintainer Triage).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>arbitrary-file-read</category><category>credential-exfiltration</category><category>openclaw</category><category>npm</category></item><item><title>OpenClaw NPM Package Vulnerable to Python Package Index Redirection</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-index-redirect/</link><pubDate>Thu, 02 Apr 2026 20:57:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-index-redirect/</guid><description>The openclaw npm package is vulnerable to Python package-index redirection through host execution due to improper sanitization of `PIP_INDEX_URL` and `UV_INDEX_URL`, affecting versions 2026.3.28 and earlier.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> npm package, versions 2026.3.28 and earlier, contains a vulnerability that allows for the redirection of Python package-index traffic. This is due to insufficient sanitization of the <code>PIP_INDEX_URL</code> and <code>UV_INDEX_URL</code> environment variables during host execution. An attacker can potentially exploit this vulnerability to redirect package installation traffic to a malicious index, potentially leading to the installation of compromised packages. The scope of this vulnerability is limited to approved or allowlisted package-management execution paths, mitigating the risk of arbitrary remote execution. Version 2026.3.31 and later contain the fix. The vulnerability was reported by @nexrin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a system using a vulnerable version (&lt;=2026.3.28) of the <code>openclaw</code> npm package.</li>
<li>The attacker gains access to the system or its environment configuration.</li>
<li>The attacker sets either the <code>PIP_INDEX_URL</code> or <code>UV_INDEX_URL</code> environment variable to point to a malicious Python package index server.</li>
<li>The system executes a package installation command (e.g., <code>pip install &lt;package&gt;</code>) through <code>openclaw</code>.</li>
<li><code>openclaw</code>, without proper sanitization, uses the attacker-controlled environment variable when resolving package dependencies.</li>
<li>The package manager connects to the malicious index server specified in the <code>PIP_INDEX_URL</code> or <code>UV_INDEX_URL</code> variable.</li>
<li>The attacker serves malicious or backdoored Python packages through the rogue index.</li>
<li>The system installs the malicious packages, potentially compromising the system with arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to the installation of malicious Python packages on systems utilizing the vulnerable <code>openclaw</code> version. This could result in arbitrary code execution, data theft, or other malicious activities, depending on the contents of the malicious packages. The scope is somewhat limited since only allowlisted execution paths are affected, which reduces the blast radius.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> npm package to version 2026.3.31 or later to remediate the vulnerability.</li>
<li>Monitor process executions involving <code>openclaw</code> and the use of <code>PIP_INDEX_URL</code> or <code>UV_INDEX_URL</code> environment variables. Deploy the Sigma rule <code>Detect OpenClaw Using Suspicious Index URL</code> to detect exploitation attempts.</li>
<li>Implement strict allowlisting of package management execution paths to further limit the potential impact.</li>
<li>Enable process creation logging to capture command line arguments and environment variables for the <code>openclaw</code> process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>npm</category><category>package-index-redirection</category><category>environment-variable-injection</category></item><item><title>OpenClaw Gateway Unauthorized Session Reset Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-session-reset/</link><pubDate>Wed, 01 Apr 2026 00:00:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-session-reset/</guid><description>A vulnerability in OpenClaw Gateway allows a write-scoped gateway caller to rotate a target session, archive the prior transcript state, and force a new session id without admin scope via the `chat.send` path by reusing command authorization to trigger `/reset` session rotation.</description><content:encoded><![CDATA[<p>OpenClaw Gateway versions 2026.3.24 and earlier contain a vulnerability that allows unauthorized session resets. A write-scoped gateway caller can exploit this flaw to rotate a target session, archive the prior transcript state, and force a new session ID, actions that should be restricted to administrative users. This is possible because the <code>chat.send</code> path incorrectly reuses command authorization checks when triggering the <code>/reset</code> functionality. Defenders should upgrade to version 2026.3.28 or later to remediate this vulnerability. This issue affects deployments where write-scoped callers should not have the ability to reset sessions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OpenClaw Gateway instance running a vulnerable version (&lt;= 2026.3.24).</li>
<li>Attacker obtains valid credentials for a gateway caller with write scope permissions.</li>
<li>Attacker crafts a <code>chat.send</code> request.</li>
<li>The <code>chat.send</code> request is designed to trigger the <code>/reset</code> command within the application.</li>
<li>The application incorrectly authorizes the <code>/reset</code> command based on the write scope of the <code>chat.send</code> request.</li>
<li>The target session is rotated, archiving the previous transcript state.</li>
<li>A new session ID is forced for the target.</li>
<li>The attacker effectively resets the target session without requiring admin-level privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a write-scoped caller to perform administrative actions, specifically session resets. This could lead to disruption of service, unauthorized access to archived session data, or other unforeseen consequences depending on the specific implementation of OpenClaw Gateway. If an attacker can repeatedly reset sessions, it could create a denial-of-service condition.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw Gateway to version 2026.3.28 or later to patch the vulnerability described in <a href="https://github.com/advisories/GHSA-5r8f-96gm-5j6g">GHSA-5r8f-96gm-5j6g</a>.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Review the commit <code>be00fcfccb</code> to understand the fix and identify any potential backporting needs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>session-reset</category><category>privilege-escalation</category></item><item><title>OpenClaw Microsoft Teams Plugin Sender Allowlist Bypass (CVE-2026-34506)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-allowlist-bypass/</link><pubDate>Tue, 31 Mar 2026 12:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-allowlist-bypass/</guid><description>OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin, allowing unauthorized senders to bypass intended authorization checks due to improper handling of empty groupAllowFrom parameters, potentially leading to information disclosure.</description><content:encoded>&lt;p>OpenClaw, a Microsoft Teams plugin, is vulnerable to a sender allowlist bypass (CVE-2026-34506) in versions prior to 2026.3.8. The vulnerability stems from a misconfiguration issue where an empty &lt;code>groupAllowFrom&lt;/code> parameter in the team/channel route allowlist leads to the synthesis of wildcard sender authorization. This allows any sender within the matched team/channel to trigger replies in allowlisted Teams routes, effectively bypassing intended authorization checks. This vulnerability was…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-34506</category><category>openclaw</category><category>microsoft teams</category><category>allowlist bypass</category></item><item><title>OpenClaw Remote Command Injection via iMessage Attachment Staging (CVE-2026-32917)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-rce/</link><pubDate>Tue, 31 Mar 2026 12:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-rce/</guid><description>OpenClaw before 2026.3.13 is vulnerable to remote command injection via unsanitized iMessage attachment paths passed to the SCP remote operand, allowing attackers to execute arbitrary commands on configured remote hosts when remote attachment staging is enabled.</description><content:encoded>&lt;p>OpenClaw, a software application whose specific function is not detailed in the provided context, is vulnerable to a remote command injection flaw. Specifically, versions prior to 2026.3.13 are susceptible. This vulnerability, identified as CVE-2026-32917, resides within the iMessage attachment staging process.  Attackers can exploit this flaw by injecting shell metacharacters into unsanitized remote attachment paths. This occurs because these paths are directly passed to the SCP command…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>imessage</category><category>openclaw</category></item><item><title>OpenClaw Gateway Plugin Subagent Admin Scope Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-admin-scope/</link><pubDate>Sun, 29 Mar 2026 15:50:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-admin-scope/</guid><description>The openclaw package versions 2026.3.24 and earlier are vulnerable due to the gateway plugin subagent fallback `deleteSession` function dispatching `sessions.delete` with a synthetic `operator.admin` runtime scope, potentially leading to unauthorized session deletion.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> package, specifically versions up to and including 2026.3.24, contains a vulnerability within the gateway plugin subagent fallback mechanism. The <code>deleteSession</code> function, when invoked without a request-scoped client, incorrectly dispatched <code>sessions.delete</code> utilizing a synthetic <code>operator.admin</code> runtime scope. This means that under certain conditions, session deletion operations were being performed with elevated privileges, potentially leading to unauthorized session management. This vulnerability was present in the code up to version 2026.3.24 and has been patched in version 2026.3.25. Defenders should ensure they are running version 2026.3.25 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A request is made to the gateway plugin that triggers the <code>deleteSession</code> function.</li>
<li>The <code>deleteSession</code> function checks for a request-scoped client.</li>
<li>If no request-scoped client exists, the code falls back to a default mechanism.</li>
<li>The vulnerable code path then incorrectly creates a synthetic <code>operator.admin</code> runtime scope.</li>
<li>The <code>sessions.delete</code> function is dispatched with the elevated <code>operator.admin</code> scope.</li>
<li>Session deletion occurs with the privileges of the synthetic admin operator.</li>
<li>An attacker could potentially trigger this code path to delete sessions they should not have access to.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to unauthorized session deletion within the <code>openclaw</code> application. While the exact impact depends on the specific deployment and usage of <code>openclaw</code>, the ability to delete arbitrary sessions could disrupt service availability or allow an attacker to invalidate legitimate user sessions. If an attacker can reliably trigger this vulnerability, it could lead to denial-of-service or other forms of service disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> package to version 2026.3.25 or later to remediate the vulnerability described in the overview.</li>
<li>Review the <code>openclaw</code> codebase and audit the usage of <code>deleteSession</code> to identify any potential misuse or unexpected invocations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>vulnerability</category><category>authorization</category></item><item><title>OpenClaw SSRF Vulnerability via Unguarded Configured Base URLs</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-ssrf/</link><pubDate>Sun, 29 Mar 2026 15:49:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-ssrf/</guid><description>OpenClaw versions 2026.3.24 and earlier are vulnerable to Server-Side Request Forgery (SSRF) because of unguarded configured base URLs in multiple channel extensions, allowing attackers to potentially access internal resources.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> package, a Node.js module, contains a Server-Side Request Forgery (SSRF) vulnerability in versions 2026.3.24 and earlier. This flaw stems from an incomplete fix for CVE-2026-28476, where several channel extensions continued to use raw <code>fetch()</code> against configured base URLs without proper SSRF protection. This omission allows attackers to potentially manipulate configured endpoints to target blocked internal destinations, bypassing intended security measures. The vulnerability was identified and patched in version 2026.3.25 through commit <code>f92c92515bd439a71bd03eb1bc969c1964f17acf</code>, which routes outbound requests through <code>fetchWithSsrFGuard</code>. Defenders should ensure they are running version 2026.3.25 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an <code>openclaw</code> instance running version 2026.3.24 or earlier.</li>
<li>The attacker identifies a channel extension that uses a configured base URL.</li>
<li>Attacker crafts a malicious configuration that redirects the base URL to an internal resource.</li>
<li>The vulnerable <code>fetch()</code> function in the channel extension makes an HTTP request to the attacker-controlled URL.</li>
<li>The request bypasses the SSRF guard due to the incomplete fix for CVE-2026-28476.</li>
<li>The targeted internal resource processes the attacker&rsquo;s request.</li>
<li>Sensitive information from the internal resource is potentially exposed to the attacker.</li>
<li>Attacker exfiltrates the exposed information, completing the SSRF attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability could allow an attacker to gain unauthorized access to internal resources and sensitive information. The number of potential victims is dependent on the prevalence of vulnerable <code>openclaw</code> instances. If successful, the attacker can read internal files, access internal services, or even potentially execute commands on internal systems, leading to data breaches or further compromise of the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> package to version 2026.3.25 or later to incorporate the fix for CVE-2026-28476, as described in the overview.</li>
<li>Implement network segmentation to limit the impact of potential SSRF vulnerabilities by restricting access from the affected systems to sensitive internal resources.</li>
<li>Deploy the Sigma rule &ldquo;Detect OpenClaw SSRF Vulnerable Versions&rdquo; to identify potentially vulnerable instances of the <code>openclaw</code> package based on user-agent strings.</li>
<li>Monitor outbound network connections from <code>openclaw</code> instances for connections to internal IP addresses or unexpected domains, which could indicate SSRF exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>openclaw</category><category>cve-2026-28476</category></item><item><title>OpenClaw Credential Exposure via Leaked Pairing Codes</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-credential-exposure/</link><pubDate>Sun, 29 Mar 2026 13:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-credential-exposure/</guid><description>OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials in pairing setup codes, allowing attackers with access to leaked codes to reuse credentials and gain unauthorized access.</description><content:encoded><![CDATA[<p>OpenClaw versions before 2026.3.12 are vulnerable to credential exposure. The vulnerability stems from the embedding of long-lived shared gateway credentials directly into pairing setup codes. These codes are generated by the <code>/pair</code> endpoint and the <code>OpenClaw qr</code> command. An attacker who obtains these setup codes through various means, such as leaked chat histories, logs, or screenshots, can extract the embedded credentials. This allows the attacker to bypass the intended one-time pairing flow and gain unauthorized access to the shared gateway. The exposure of these credentials could lead to further unauthorized access and potential compromise of sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user generates a pairing setup code using the <code>/pair</code> endpoint or <code>OpenClaw qr</code> command. This code contains the embedded shared gateway credentials.</li>
<li>The setup code is shared with the intended recipient via chat, logs or screenshots.</li>
<li>The attacker gains access to the setup code through compromised chat history, exposed logs, or publicly shared screenshots.</li>
<li>The attacker extracts the long-lived shared gateway credential from the setup code.</li>
<li>The attacker reuses the stolen shared gateway credentials outside of the intended one-time pairing flow.</li>
<li>The attacker gains unauthorized access to the shared gateway.</li>
<li>The attacker leverages the access gained via the gateway for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass the intended one-time pairing flow and gain unauthorized access to the shared gateway. The number of potential victims is dependent on the number of OpenClaw deployments and the exposure of pairing setup codes. The primary impact is unauthorized access and potential compromise of sensitive data accessible through the shared gateway.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.12 or later to remediate the vulnerability (CVE-2026-33575).</li>
<li>Implement strict controls over the handling and storage of pairing setup codes to prevent unauthorized access.</li>
<li>Monitor network traffic for suspicious activity originating from OpenClaw gateways, potentially indicating unauthorized access using leaked credentials.</li>
<li>Deploy the Sigma rule to detect the usage of the <code>/pair</code> endpoint which could indicate unauthorized pairing attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>vulnerability</category><category>openclaw</category></item><item><title>OpenClaw Code Execution via Script Modification (CVE-2026-32979)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-code-exec/</link><pubDate>Sun, 29 Mar 2026 13:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-code-exec/</guid><description>OpenClaw before 2026.3.11 is vulnerable to an approval integrity issue (CVE-2026-32979) allowing attackers to execute arbitrary code by modifying approved local scripts before they are executed.</description><content:encoded>&lt;p>OpenClaw, a software application, is susceptible to an approval integrity vulnerability identified as CVE-2026-32979. This flaw exists in versions prior to 2026.3.11. An attacker can exploit this vulnerability to execute malicious code within the context of the OpenClaw runtime user. The attack involves modifying approved local scripts between the time they are approved and the time they are executed. This is possible because exact file binding does not occur, which allows for the alteration of…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32979</category><category>code-execution</category><category>openclaw</category></item><item><title>OpenClaw Exec Allowlist Bypass via POSIX Path Overmatching (CVE-2026-32973)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-bypass/</link><pubDate>Sun, 29 Mar 2026 13:17:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-bypass/</guid><description>OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability (CVE-2026-32973) due to improper normalization of patterns, allowing attackers to execute unintended commands via wildcard matching in POSIX paths.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.3.11 are susceptible to an exec allowlist bypass vulnerability, identified as CVE-2026-32973. The vulnerability stems from the <code>matchesExecAllowlistPattern</code> function&rsquo;s flawed normalization process, specifically its handling of lowercasing and glob matching. This leads to overmatching on POSIX paths, enabling attackers to circumvent intended restrictions. By leveraging the &lsquo;?&rsquo; wildcard, attackers can match across path segments to execute commands or access paths…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-32973</category><category>openclaw</category><category>allowlist-bypass</category></item><item><title>OpenClaw Session Sandbox Escape Vulnerability (CVE-2026-32918)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-sandbox-escape/</link><pubDate>Sun, 29 Mar 2026 13:17:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-sandbox-escape/</guid><description>OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool, allowing sandboxed subagents to access and modify session data outside their intended scope.</description><content:encoded><![CDATA[<p>CVE-2026-32918 affects OpenClaw versions prior to 2026.3.11. The vulnerability resides in the <code>session_status</code> tool, which is intended to manage sandboxed subagents. However, a flaw allows these sandboxed agents to bypass their intended restrictions and access session data belonging to parent or sibling sessions. An attacker can exploit this by supplying arbitrary <code>sessionKey</code> values, enabling them to read and modify sensitive session data, including persisted model overrides, far beyond the…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>sandbox-escape</category><category>authorization</category></item><item><title>OpenClaw Gateway Plugin Grants Unrestricted operator.admin Runtime Scope</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-admin-scope/</link><pubDate>Fri, 27 Mar 2026 22:32:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-admin-scope/</guid><description>The openclaw gateway plugin versions 2026.3.24 and earlier incorrectly grants operator.admin runtime scope to all callers, regardless of their granted scopes, potentially allowing unauthorized actions.</description><content:encoded><![CDATA[<p>The OpenClaw gateway plugin, specifically in versions up to and including 2026.3.24, contains a vulnerability related to runtime scope management. This flaw allows any caller interacting with the gateway to be granted the <code>operator.admin</code> scope, irrespective of the permissions they should possess. This means that users or systems with limited access can potentially perform administrative actions within the OpenClaw environment. This vulnerability was resolved in version 2026.3.25 with the application of commit <code>ec2dbcff9afd8a52e00de054b506c91726d9fbbe</code>, which implemented a least-privilege approach for plugin HTTP runtime scopes, ensuring that caller scope boundaries are respected. This issue poses a significant risk to OpenClaw deployments, especially in multi-tenant or environments where strict permission controls are required.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an OpenClaw instance running a vulnerable version (&lt;= 2026.3.24) of the gateway plugin.</li>
<li>The attacker crafts a standard HTTP request to a gateway-authenticated plugin HTTP route.</li>
<li>The gateway plugin authenticates the request (assuming valid credentials or bypassing authentication due to misconfiguration).</li>
<li>Due to the vulnerability, the plugin incorrectly mints a runtime scope set that includes <code>operator.admin</code>, regardless of the caller&rsquo;s actual permissions.</li>
<li>The attacker&rsquo;s request is processed with the elevated <code>operator.admin</code> privileges.</li>
<li>The attacker leverages these elevated privileges to perform unauthorized administrative actions within the OpenClaw system.</li>
<li>These actions could include modifying system configurations, accessing sensitive data, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass intended permission controls within OpenClaw. The impact can range from unauthorized data access to complete system compromise, depending on the specific administrative actions the attacker is able to perform. The vulnerability affects all deployments using the vulnerable OpenClaw gateway plugin versions. This is especially critical in environments where strict role-based access control is required.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw gateway plugin to version 2026.3.25 or later to patch the vulnerability (reference: Affected Packages / Versions).</li>
<li>Implement monitoring for unusual activity related to OpenClaw administrative functions to detect potential exploitation attempts (reference: Sigma rule &ldquo;Detect OpenClaw Admin Operations from Non-Admin Sources&rdquo;).</li>
<li>Review and audit existing OpenClaw configurations and permissions to ensure adherence to the principle of least privilege (reference: Overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>privilege-escalation</category><category>vulnerability</category></item><item><title>OpenClaw Symlink Traversal via IDENTITY.md appendFile in agents.create/update</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-symlink/</link><pubDate>Fri, 27 Mar 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-symlink/</guid><description>OpenClaw is vulnerable to symlink traversal via IDENTITY.md appendFile in agents.create/update. An attacker who can place a symlink in the agent workspace can hijack the IDENTITY.md path to append attacker-controlled content to arbitrary files on the system leading to remote code execution, persistent code execution, unauthorized SSH access, or service disruption.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> npm package is vulnerable to a symlink traversal vulnerability (CVE-2026-32013) affecting versions 2026.2.22 and earlier. The vulnerability lies in the <code>agents.create</code> and <code>agents.update</code> handlers within the <code>src/gateway/server-methods/agents.ts</code> file. These handlers use <code>fs.appendFile</code> on the <code>IDENTITY.md</code> file without proper symlink containment checks. An attacker capable of placing a symlink within the agent workspace can redirect the <code>IDENTITY.md</code> path to point to arbitrary files on the system, allowing them to append attacker-controlled content to these files. This can lead to serious consequences such as remote code execution by modifying <code>/etc/crontab</code>, persistent code execution by modifying shell configuration files like <code>~/.bashrc</code>, or unauthorized SSH access by modifying <code>~/.ssh/authorized_keys</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the agent workspace.</li>
<li>The attacker plants a symbolic link named <code>IDENTITY.md</code> within the agent workspace. This symlink points to a sensitive system file, such as <code>/etc/crontab</code> or <code>~/.ssh/authorized_keys</code>.</li>
<li>The <code>ensureAgentWorkspace</code> function is called, but the exclusive-create flag (<code>wx</code>) skips creation due to the existing symlink (EEXIST error).</li>
<li>The attacker triggers the <code>agents.create</code> or <code>agents.update</code> API endpoint, for example, by sending an HTTP POST request.</li>
<li>The <code>agents.create</code> or <code>agents.update</code> handler constructs the path to <code>IDENTITY.md</code> using <code>path.join(workspaceDir, DEFAULT_IDENTITY_FILENAME)</code>.</li>
<li>The vulnerable <code>fs.appendFile</code> function is called to append agent metadata (name, emoji, avatar) to the <code>IDENTITY.md</code> file. Because <code>fs.appendFile</code> follows symlinks, the content is written to the attacker-controlled target file.</li>
<li>Attacker-controlled data is appended to the target file.</li>
<li>If the target file is a cron configuration file, this leads to remote code execution. If it&rsquo;s an SSH authorized_keys file, this leads to unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to append attacker-controlled content to arbitrary files on the system. This can lead to:</p>
<ul>
<li><strong>Remote Code Execution:</strong> By appending malicious entries to <code>/etc/crontab</code> or user crontab files.</li>
<li><strong>Persistent Code Execution:</strong> By modifying shell configuration files like <code>~/.bashrc</code> or <code>~/.profile</code>.</li>
<li><strong>Unauthorized SSH Access:</strong> By appending SSH keys to <code>~/.ssh/authorized_keys</code>.</li>
<li><strong>Service Disruption:</strong> By modifying application configuration files.</li>
</ul>
<p>The vulnerability affects <code>openclaw</code> versions 2026.2.22 and earlier, and no patches are currently available. The number of affected systems depends on the adoption rate of the <code>openclaw</code> package.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor file creation events within agent workspace directories for the creation of symbolic links using file_event logs.</li>
<li>Implement and deploy the provided Sigma rule to detect exploitation attempts by monitoring <code>fs.appendFile</code> calls related to IDENTITY.md without symlink resolution.</li>
<li>Restrict access to the agent workspace directory to prevent attackers from planting symlinks.</li>
<li>Upgrade to a patched version of <code>openclaw</code> when available.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>symlink-traversal</category><category>vulnerability</category><category>npm</category><category>rce</category><category>persistence</category></item><item><title>OpenClaw ACP Chat Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-06-openclaw-acp-bypass/</link><pubDate>Thu, 26 Mar 2026 21:25:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-openclaw-acp-bypass/</guid><description>A vulnerability in the openclaw npm package before version 2026.3.22 allowed mutating internal ACP chat commands without requiring operator.admin scope enforcement, potentially allowing unauthorized control-plane actions.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> npm package, versions prior to 2026.3.22, contained a vulnerability where internal ACP (Admin Control Panel) chat commands could be mutated without proper <code>operator.admin</code> scope enforcement. This flaw could be exploited by an attacker to bypass intended security controls and execute unauthorized administrative actions within the OpenClaw application. The vulnerability was reported by @tdjackey and patched in version 2026.3.22. Defenders should ensure they are running version 2026.3.22 or later to mitigate this risk. The scope of impact is limited to systems running vulnerable versions of the <code>openclaw</code> package.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of OpenClaw running a version prior to 2026.3.22.</li>
<li>Attacker crafts a malicious chat command intended to interact with the ACP.</li>
<li>The malicious command bypasses the intended <code>operator.admin</code> scope check due to the vulnerability.</li>
<li>The crafted command is sent to the OpenClaw application via the chat interface.</li>
<li>The vulnerable code in <code>src/auto-reply/reply/commands-acp.ts</code> processes the command without proper authorization.</li>
<li>The command execution results in the mutation of internal ACP configurations or data.</li>
<li>Attacker leverages the mutated configurations to gain further control over the OpenClaw application or its environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow an attacker to perform unauthorized administrative actions within the OpenClaw application. This may include modifying application settings, accessing sensitive data, or disrupting services. The severity of the impact depends on the specific ACP commands that are exposed and the attacker&rsquo;s ability to chain together multiple commands for greater effect.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> npm package to version 2026.3.22 or later to apply the fix described in the advisory (see Affected Packages / Versions).</li>
<li>Monitor chat command inputs for unusual syntax or attempts to access administrative functionalities to detect potential exploitation attempts (use network or application logs).</li>
<li>Review and audit existing OpenClaw configurations for any unauthorized modifications that may have occurred due to this vulnerability.</li>
<li>Implement input validation and sanitization on all chat command inputs to prevent command injection attacks.</li>
<li>Deploy the Sigma rule provided to detect attempts to use ACP commands without proper authorization (see &ldquo;OpenClaw ACP Command Execution Without Admin Scope&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>acp</category><category>chat-command-injection</category><category>vulnerability</category></item><item><title>OpenClaw Improper Header Validation Leads to Credential Leakage</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-header-leak/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-header-leak/</guid><description>OpenClaw before 2026.3.7 is vulnerable to improper header validation in fetchWithSsrFGuard, allowing attackers to intercept sensitive authorization headers via cross-origin redirects.</description><content:encoded><![CDATA[<p>OpenClaw, a Node.js framework, is susceptible to a critical vulnerability (CVE-2026-32913) affecting versions prior to 2026.3.7. The vulnerability lies in the <code>fetchWithSsrFGuard</code> function, which improperly validates headers. This flaw allows attackers to potentially forward custom authorization headers, such as <code>X-Api-Key</code> and <code>Private-Token</code>, across cross-origin redirects. Successful exploitation enables the interception of sensitive credentials intended for the original, legitimate destination. The vulnerability was reported in March 2026 and impacts applications using the vulnerable versions of OpenClaw. Defenders should prioritize patching and implementing compensating controls to prevent credential leakage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious URL targeting an OpenClaw application using a version prior to 2026.3.7.</li>
<li>The victim&rsquo;s browser or application requests the malicious URL, including custom authorization headers like <code>X-Api-Key</code> or <code>Private-Token</code>.</li>
<li>The vulnerable <code>fetchWithSsrFGuard</code> function in OpenClaw fails to properly validate or sanitize headers during cross-origin redirects.</li>
<li>The attacker configures their malicious server to respond with an HTTP 302 redirect to a different origin controlled by the attacker.</li>
<li>The victim&rsquo;s client, upon receiving the redirect, unknowingly forwards the sensitive authorization headers to the attacker&rsquo;s server.</li>
<li>The attacker&rsquo;s server logs or captures the leaked <code>X-Api-Key</code> and/or <code>Private-Token</code> values.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to resources or data protected by those credentials on the original target application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32913 can lead to the leakage of sensitive API keys and private tokens. This allows unauthorized access to protected resources, potentially leading to data breaches, account compromise, and other malicious activities. While the specific number of affected applications remains unknown, all OpenClaw deployments prior to version 2026.3.7 are vulnerable. The impact is significant due to the potential for widespread credential compromise across various sectors utilizing OpenClaw for their applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.7 or later to patch CVE-2026-32913 (see references for patch information).</li>
<li>Implement server-side validation to sanitize and strip potentially sensitive authorization headers before following redirects.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Header Forwarding</code> to identify potential exploitation attempts by monitoring for cross-origin redirects involving sensitive headers.</li>
<li>Monitor web server logs for unusual redirect activity and suspicious user agents (see log source information in the Sigma rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32913</category><category>credential-access</category><category>header-injection</category><category>openclaw</category></item></channel></rss>