Description
OpenClaw before 2026.4.12 contains an improper authorization vulnerability in helper-backed channels where empty resolved approver lists are interpreted as explicit approval authorization. Attackers can resolve pending approvals without proper authorization by exploiting this logic flaw if they know an approval id.
Published: 2026-05-05
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenClaw before 2026.4.12 contains a logic flaw that treats empty resolved approver lists as explicit approval. This allows an attacker who knows an approval id to resolve pending approvals without proper authorization or credentials. The flaw effectively bypasses approval controls, enabling unauthorized changes or actions within the system.

Affected Systems

The affected product is OpenClaw from OpenClaw. Versions earlier than 2026.4.12 are affected. The flaw resides in the helper‑backed channels handling approval resolutions.

Risk and Exploitability

The CVSS score is 6, indicating moderate severity. No EPSS metric is available, and the vulnerability is not listed in the CISA KEV catalog. The attack requires knowledge of a valid approval identifier and access to the helper‑backed channel endpoint, which could be performed remotely if the application is exposed. Given the absence of low exploit probability metrics, the risk is considered moderate but should be mitigated promptly.

Generated by OpenCVE AI on May 5, 2026 at 12:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.4.12 or later where the logic flaw is fixed.
  • If an upgrade is not immediately possible, restrict or disable the helper‑backed channel endpoints until the patch is applied.
  • Enforce server‑side validation that rejects empty approver lists as an unauthorized action and requires explicit approver entries before resolution.
  • Monitor approval logs for anomalous resolution events and audit approval activities for signs of abuse.

Generated by OpenCVE AI on May 5, 2026 at 12:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-49cg-279w-m73x OpenClaw: Empty approver lists could grant explicit approval authorization
History

Tue, 05 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 05 May 2026 11:45:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.12 contains an improper authorization vulnerability in helper-backed channels where empty resolved approver lists are interpreted as explicit approval authorization. Attackers can resolve pending approvals without proper authorization by exploiting this logic flaw if they know an approval id.
Title OpenClaw < 2026.4.12 - Improper Authorization via Empty Approver Lists
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-183
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}

cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-05T12:19:57.990Z

Reserved: 2026-05-01T16:58:23.117Z

Link: CVE-2026-43574

cve-icon Vulnrichment

Updated: 2026-05-05T12:19:53.633Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-05T12:16:21.307

Modified: 2026-05-05T19:32:49.650

Link: CVE-2026-43574

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T12:45:24Z

Weaknesses