Description
OpenClaw before 2026.3.22 contains a service discovery vulnerability where TXT metadata from Bonjour and DNS-SD could influence CLI routing even when actual service resolution failed. Attackers can exploit unresolved hints to steer routing decisions to unintended targets by providing malicious discovery metadata.
Published: 2026-04-10
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Routing Redirection
Action: Apply Patch
AI Analysis

Impact

OpenClaw versions prior to 2026.3.22 contain a flaw in the service discovery mechanism where TXT metadata supplied via Bonjour and DNS‑SD can influence command‑line interface routing even when the advertised service cannot be resolved. An attacker who can inject malicious discovery metadata may steer the routing logic to propagate traffic to unintended targets, potentially exposing data or allowing the execution of unintended code on those targets. This weakness can be used to affect the confidentiality and integrity of network communications, though it does not grant direct code execution privileges. The Common Weakness Enumeration associated with this issue is CWE‑345, indicating insecure handling of input metadata.

Affected Systems

The affected product is OpenClaw OpenClaw running any version earlier than 2026.3.22. Users of this software running those versions are at risk unless they upgrade or apply mitigations.

Risk and Exploitability

The CVSS score of 5.1 suggests moderate severity, and there is no publicly known exploit or listing in the CISA Known Exploited Vulnerabilities catalog. Exploitation would likely require an attacker with local or network proximity able to broadcast or otherwise provide forged Bonjour/DNS‑SD TXT records. The attack vector is inferred to be local or network‑based, given the nature of the service discovery protocol. While the exact likelihood of successful exploitation is uncertain without new evidence, the presence of the flaw and its potential impact warrants attention and remediation.

Generated by OpenCVE AI on April 10, 2026 at 17:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OpenClaw version 2026.3.22 or later, which includes the fix for this metadata routing issue.
  • Verify that the installed version contains the patch referenced in the OpenClaw GitHub commits for 2026.3.22.
  • If an immediate upgrade is not possible, configure network policies to block or restrict Bonjour and DNS‑SD discovery traffic on affected hosts.
  • Monitor for unexpected service discovery advertisements that could indicate attempts to influence routing.
  • Keep the OpenClaw installation up to date and apply future security patches promptly.

Generated by OpenCVE AI on April 10, 2026 at 17:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rvqr-hrcc-j9vv OpenClaw: Bonjour/DNS-SD TXT metadata steers CLI routing after failed service resolution
History

Fri, 10 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.22 contains a service discovery vulnerability where TXT metadata from Bonjour and DNS-SD could influence CLI routing even when actual service resolution failed. Attackers can exploit unresolved hints to steer routing decisions to unintended targets by providing malicious discovery metadata.
Title OpenClaw < 2026.3.22 - Unresolved Service Metadata Routing via Bonjour and DNS-SD Discovery
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-345
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-10T16:58:50.963Z

Reserved: 2026-04-04T12:31:57.498Z

Link: CVE-2026-35659

cve-icon Vulnrichment

Updated: 2026-04-10T16:58:47.121Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T17:17:07.277

Modified: 2026-04-13T19:21:30.433

Link: CVE-2026-35659

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T13:00:44Z

Weaknesses