Critical OpenClaw Vulnerabilities Expose Systems to Data Theft and Unauthorized Access
Recent cybersecurity research has unveiled four significant vulnerabilities within OpenClaw, an open-source AI agent platform. These flaws, collectively termed Claw Chain by security firm Cyera, present a substantial risk, potentially allowing attackers to execute data theft, escalate privileges, and establish persistent access within affected systems.
Detailed Breakdown of the Vulnerabilities:
1. CVE-2026-44112 (CVSS Score: 9.6/6.3): This vulnerability is a time-of-check to time-of-use (TOCTOU) race condition found in OpenShell’s managed sandbox backend. It enables attackers to circumvent sandbox restrictions, permitting unauthorized write operations outside the designated mount root.
2. CVE-2026-44113 (CVSS Score: 7.7/6.3): Similar to the previous flaw, this TOCTOU race condition in OpenShell allows attackers to bypass sandbox limitations, granting them the ability to read files beyond the intended mount root.
3. CVE-2026-44115 (CVSS Score: 8.8): This issue arises from an incomplete list of disallowed inputs. Attackers can exploit this by embedding shell expansion tokens within a here document (heredoc) body, leading to the execution of unauthorized commands during runtime.
4. CVE-2026-44118 (CVSS Score: 7.8): An improper access control vulnerability that allows non-owner loopback clients to impersonate an owner. This impersonation can lead to elevated privileges, granting control over gateway configurations, cron scheduling, and execution environment management.
Potential Exploitation Pathway:
An attacker could exploit these vulnerabilities in a sequential manner:
1. Initial Access: A malicious plugin, prompt injection, or compromised external input gains code execution within the OpenShell sandbox.
2. Data Exposure: Utilizing CVE-2026-44113 and CVE-2026-44115, the attacker accesses sensitive files, including credentials and secrets.
3. Privilege Escalation: By exploiting CVE-2026-44118, the attacker attains owner-level control over the agent runtime.
4. Persistence: Leveraging CVE-2026-44112, the attacker plants backdoors or modifies configurations to maintain persistent access.
Root Cause Analysis:
The core issue, particularly with CVE-2026-44118, stems from OpenClaw’s reliance on a client-controlled ownership flag, `senderIsOwner`. This flag indicates whether the caller is authorized for owner-only tools but lacks validation against the authenticated session, leading to potential exploitation.
Mitigation Measures:
In response to these findings, OpenClaw has released version 2026.4.22, addressing all identified vulnerabilities. The update includes issuing separate owner and non-owner bearer tokens and deriving `senderIsOwner` exclusively from the token that authenticated the request. Users are strongly advised to update to this latest version to safeguard their systems against potential threats.
Broader Implications:
This discovery underscores the critical importance of rigorous security practices in AI agent platforms. The ability of attackers to exploit such vulnerabilities can lead to significant data breaches and unauthorized system control. Organizations utilizing OpenClaw should prioritize this update and remain vigilant for any unusual system behaviors.