OpenClaw before 2026.3.22 contains a policy bypass vulnerability where queued node actions are not revalidated against current command policy when delivered. Attackers can exploit stale allowlists or declarations that survive policy tightening to execute unauthorized commands.
References
Configurations
History
13 Apr 2026, 20:46
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87 - Patch | |
| References | () https://github.com/openclaw/openclaw/commit/ec2c6d83b9f5f91d6d9094842e0f19b88e63e3e2 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-wj55-88gf-x564 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-policy-bypass-via-unvalidated-queued-node-actions - Third Party Advisory |
10 Apr 2026, 17:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 17:17
Updated : 2026-04-13 20:46
NVD link : CVE-2026-35648
Mitre link : CVE-2026-35648
CVE.ORG link : CVE-2026-35648
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
