Description
OpenClaw versions 2026.3.31 before 2026.4.10 contain a privilege escalation vulnerability where heartbeat owner downgrade detection misses local background async exec completion events. Attackers can exploit this by providing untrusted completion content to leave a run in a more privileged context than intended.
Published: 2026-05-06
Score: 9.1 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenClaw implementations between versions 2026.3.31 and before 2026.4.10 are subject to a privilege‑escalation flaw. The heartbeat owner downgrade routine incorrectly discards data from local background async execution completion events. If an attacker supplies untrusted completion payloads, the system may leave a background job running in a privileged context that was not intended for that job. The flaw is an instance of CWE‑184 and elevates the attacker’s privilege on the host.

Affected Systems

Affected systems include all deployments of the OpenClaw product between versions 2026.3.31 and 2026.4.09, which run on Node.js environments. The flaw applies to any system that has the vulnerable OpenClaw package installed.

Risk and Exploitability

The CVSS score of 9.1 signals a high‑severity problem. EPSS data is not available, but the lack of a KEV listing does not reduce the urgency. The advisory indicates that the flaw can be triggered locally by injecting malicious completion data into background async exec operations. An attacker with write access to the data or a compromised module can thus cause privileged execution without needing to bypass authentication. Properly validated completion events would block this escalation path.

Generated by OpenCVE AI on May 6, 2026 at 21:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OpenClaw 2026.4.10 or later to apply the vendor‑issued fix.
  • If upgrading is delayed, apply the patch from commit 19a2e9ddb5a8a494abcba812bb11f51075026a27, which validates completion content before execution.
  • Disable or restrict the use of background async exec functions until a patch is in place, ensuring no untrusted content can be executed in a higher‑privilege context.

Generated by OpenCVE AI on May 6, 2026 at 21:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions 2026.3.31 before 2026.4.10 contain a privilege escalation vulnerability where heartbeat owner downgrade detection misses local background async exec completion events. Attackers can exploit this by providing untrusted completion content to leave a run in a more privileged context than intended.
Title OpenClaw 2026.3.31 < 2026.4.10 - Privilege Escalation via Missed Async Exec Completion Events in Heartbeat Owner Downgrade
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-184
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 9.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-06T19:49:21.819Z

Reserved: 2026-05-01T17:00:54.537Z

Link: CVE-2026-43578

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T20:16:33.510

Modified: 2026-05-06T21:21:14.220

Link: CVE-2026-43578

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T01:00:13Z

Weaknesses