Impact
The vulnerability lies in OpenClaw's process cleanup mechanism, which enumerates all processes on the host and terminates those whose command line matches a pattern. The cleanup routine does not verify that a matched process belongs to the current OpenClaw instance. As a result, a local or privileged user can trigger the CLI to send SIGKILL signals to any process that matches the pattern, regardless of ownership. This flaw can lead to unintended termination of unrelated processes, causing disruption of services or user tasks, and is classified as CWE‑283, an authorization error. The primary impact is local denial of service through arbitrary process termination.
Affected Systems
The affected product is the OpenClaw personal AI assistant CLI, produced by the vendor OpenClaw. Versions 2026.2.13 and earlier are vulnerable. The issue does not affect the OpenClaw server component or any other platform, as it is confined to the CLI's cleanup helper. The vulnerability applies to deployments running on shared hosts where the OpenClaw CLI has the necessary permissions to enumerate and kill system processes.
Risk and Exploitability
The CVSS base score of 4.3 indicates a moderate severity. The EPSS score is below 1%, implying a very low probability of exploitation at the present time. OpenClaw is not listed in the CISA KEV catalog, and no public exploit code is available yet. The flaw is exploitable by a local attacker who can execute the CLI or has access to its cleanup functionality. Because the bug runs locally and requires only the ability to invoke the cleanup routine, the attack vector is inferred as local or shared-host exploitation. The impact is relatively limited to the host environment and does not provide remote code execution or network compromise.
OpenCVE Enrichment
Github GHSA