Impact
OpenClaw versions earlier than 2026.3.22 contain an identity spoofing vulnerability in the ACP permission resolution mechanism. The flaw arises because the system trusts conflicting tool identity hints supplied by the rawInput parameter and associated metadata, allowing an attacker to supply forged identity information. Exploiting this weakness can lead to suppression of dangerous-tool prompts and unauthorized execution of privileged actions by masquerading as a legitimate tool. The underlying weakness maps to CWE-807, indicating that the application accepts user‑supplied query parameters that influence identity checks.
Affected Systems
Affected systems include all installations of OpenClaw prior to release 2026.3.22. The product, identified as OpenClaw:OpenClaw, runs on Node.js as indicated by the CPE string. Any deployment of the vulnerable OpenClaw instance is susceptible, regardless of host operating system.
Risk and Exploitability
The CVSS score of 6.9 classifies this issue as medium severity. The EPSS score is not available, but the absence from CISA’s KEV catalogue suggests limited current exploitation activity. The likely attack vector requires an attacker to inject malicious parameters into a rawInput request that the OpenClaw instance processes, potentially enabling identity spoofing and subsequent privilege escalation or bypass of security controls.
OpenCVE Enrichment
Github GHSA