Impact
The vulnerability allows attackers to elevate privileges by sending specially crafted untrusted webhook wake events that bypass the heartbeat owner downgrade logic, giving them execution context equivalent to the owner. This flaw originates from a weakness in the heartbeat module and is classified as CWE-184, enabling code execution with elevated rights without proper authentication.
Affected Systems
OpenClaw OpenClaw versions 2026.4.7 through 2026.4.13 are impacted, as the heartbeat owner downgrade logic in these releases incorrectly skips untrusted webhook wake events.
Risk and Exploitability
The CVSS score of 9.1 signals a critical risk level. EPSS information is not available, and the vulnerability is not listed in CISA’s KEV catalog, which may indicate limited known exploitation. The attack vector is inferred to be remote via the webhook interface, allowing an adversary to send malicious wake events that gain owner‑like execution privileges.
OpenCVE Enrichment
Github GHSA