OpenClaw before 2026.3.22 contains a service discovery vulnerability where TXT metadata from Bonjour and DNS-SD could influence CLI routing even when actual service resolution failed. Attackers can exploit unresolved hints to steer routing decisions to unintended targets by providing malicious discovery metadata.
References
Configurations
History
13 Apr 2026, 19:21
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87 - Patch | |
| References | () https://github.com/openclaw/openclaw/commit/deecf68b59a9b7eea978e40fd3c2fe543087b569 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-rvqr-hrcc-j9vv - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-unresolved-service-metadata-routing-via-bonjour-and-dns-sd-discovery - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
10 Apr 2026, 17:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 17:17
Updated : 2026-04-13 19:21
NVD link : CVE-2026-35659
Mitre link : CVE-2026-35659
CVE.ORG link : CVE-2026-35659
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-345
Insufficient Verification of Data Authenticity
