Impact
The vulnerability arises from an unpatched killProcessTree function in OpenClaw versions earlier than 2026.3.24, which sends a SIGKILL without a graceful SIGTERM shutdown when the !stop chat command is issued. This behavior can cause data corruption, resource leaks, and the omission of security‑sensitive cleanup operations, compromising data integrity and potentially destabilizing the host process.
Affected Systems
OpenClaw:OpenClaw installations using any release prior to 2026.3.24 are affected. Users deploying earlier versions should verify their deployment and plan an upgrade once the patched release becomes available.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity; the vulnerability lacks a publicly available exploit strategy but can be triggered by anyone with knowledge of the !stop command in the chat interface, inferring a user‑initiated attack path. Because the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, the likelihood of widespread exploitation is uncertain but sufficient to warrant timely patching.
OpenCVE Enrichment
Github GHSA