Impact
OpenClaw versions released before 2026.4.10 allow a sandboxed agent to override the execution routing logic by specifying a host parameter value of node. This enables an attacker to redirect the agent’s commands to an arbitrary remote node, effectively bypassing the intended sandbox boundaries. The weakness corresponds to CWE‑863, indicating improper implementation of authority control. If exploited, the attacker can execute privileged commands outside the sandbox, jeopardizing the confidentiality, integrity, and availability of the affected system.
Affected Systems
The product impacted is OpenClaw, a node.js–based platform. Version numbers from 2026.4.5 through 2026.4.9 contain the flaw. Users running any of these releases are affected, and should verify their installed version against the listed range.
Risk and Exploitability
The CVSS score of 8.7 highlights a high severity scenario. While an EPSS score is not available, the lack of immediate public exploit discussion does not diminish the risk: the vulnerability removes critical access controls. The KEV status is not listed, but the affected version range suggests that the issue is readily exploitable via crafted input in the host parameter. Attackers would need to trigger the exec routing logic within a sandboxed environment, which can be achieved by supplying a host value set to node as part of a normal API request.
OpenCVE Enrichment
Github GHSA