• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

4 OpenClaw Flaws Allow Knowledge Theft, Privilege Escalation, and Persistence

Admin by Admin
May 15, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Ravie LakshmananMight 15, 2026Vulnerability / AI Safety

OpenClaw Flaws

Cybersecurity researchers have disclosed a set of 4 safety flaws in OpenClaw that might be chained to attain information theft, privilege escalation, and persistence.

The vulnerabilities, collectively dubbed

Claw Chain

by Cyera, can allow an attacker to determine a foothold, expose delicate information, and plant backdoors. A short description of the failings is under –


  • CVE-2026-44112

    (CVSS rating: 9.6/6.3) – A time-of-check/time-of-use (TOCTOU) race situation vulnerability within the
    OpenShell
    managed sandbox backend that permits attackers to bypass sandbox restrictions and redirect writes exterior the meant mount root. 

  • CVE-2026-44113

    (CVSS rating: 7.7/6.3) – A TOCTOU race situation vulnerability in OpenShell that permits attackers to bypass sandbox restrictions and skim recordsdata exterior the meant mount root.

  • CVE-2026-44115

    (CVSS rating: 8.8) – An incomplete record of disallowed inputs vulnerability that permits attackers to bypass allowlist validation by embedding shell enlargement tokens in a
    right here doc
    (heredoc) physique to execute unapproved instructions at runtime.

  • CVE-2026-44118

    (CVSS rating: 7.8) – An improper entry management vulnerability that might enable non-owner loopback shoppers to impersonate an proprietor to raise their privileges and acquire management over gateway configuration, cron scheduling, and execution atmosphere administration.

Cyera stated profitable exploitation of CVE-2026-44112 might enable an attacker to tamper with configuration, plant backdoors, and set up persistent management over the compromised host, whereas CVE-2026-44113 might be weaponized to learn system recordsdata, credentials, and inner artifacts.

The exploitation chain unfolds over 4 steps –

  • A malicious plugin, immediate injection, or compromised exterior enter positive aspects code execution contained in the OpenShell sandbox.
  • Leverage CVE-2026-44113 and CVE-2026-44115 to show credentials, secrets and techniques, and delicate recordsdata.
  • Exploit CVE-2026-44118 to acquire owner-level management of the agent runtime.
  • Use CVE-2026-44112 to plant backdoors or make configuration modifications and arrange persistence.

The foundation trigger for CVE-2026-44118, per the cybersecurity firm, stems from the truth that OpenClaw trusts a client-controlled possession flag known as senderIsOwner, which alerts whether or not the caller is permitted for owner-only instruments, with out validating it towards the authenticated session.

“The MCP loopback runtime now points separate proprietor and non-owner bearer tokens and derives senderIsOwner solely from which token authenticated the request,” OpenClaw detailed the fixes in an advisory for the flaw. “The spoofable sender-owner header is now not emitted or trusted.”

Following accountable disclosure, all 4 vulnerabilities have been addressed in OpenClaw model 2026.4.22. Safety researcher Vladimir Tokarev has been credited with discovering and reporting the problems. Customers are suggested to replace to the most recent model to remain protected towards potential threats.

“By weaponizing the agent’s personal privileges, an adversary strikes by way of information entry, privilege escalation, and persistence — utilizing the agent as their arms contained in the atmosphere,” Cyera stated. “Every step seems like regular agent conduct to conventional controls, broadening blast radius and making detection considerably tougher.”

Tags: DataEnableEscalationFlawsOpenClawPersistencePrivilegeTheft
Admin

Admin

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Hazy Hawk Exploits DNS Information to Hijack CDC, Company Domains for Malware Supply

Hazy Hawk Exploits DNS Information to Hijack CDC, Company Domains for Malware Supply

May 20, 2025
DOGE Employee’s Code Helps NLRB Whistleblower – Krebs on Safety

DOGE Employee’s Code Helps NLRB Whistleblower – Krebs on Safety

April 24, 2025

Trending.

Researchers Uncover Crucial GitHub CVE-2026-3854 RCE Flaw Exploitable by way of Single Git Push

Researchers Uncover Crucial GitHub CVE-2026-3854 RCE Flaw Exploitable by way of Single Git Push

April 29, 2026
Google Introduces Simula: A Reasoning-First Framework for Producing Controllable, Scalable Artificial Datasets Throughout Specialised AI Domains

Google Introduces Simula: A Reasoning-First Framework for Producing Controllable, Scalable Artificial Datasets Throughout Specialised AI Domains

April 21, 2026
Undertaking possession (fairness and fairness)

Your work diary | Seth’s Weblog

May 6, 2026
The Obtain: the tech reshaping IVF and the rise of balcony photo voltaic

The Obtain: the tech reshaping IVF and the rise of balcony photo voltaic

May 7, 2026
From Shader Uniforms to Clip-Path Wipes: How GSAP Drives My Portfolio

From Shader Uniforms to Clip-Path Wipes: How GSAP Drives My Portfolio

May 7, 2026

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

4 OpenClaw Flaws Allow Knowledge Theft, Privilege Escalation, and Persistence

4 OpenClaw Flaws Allow Knowledge Theft, Privilege Escalation, and Persistence

May 15, 2026
What They Are, How They Work, and  Construct One

What They Are, How They Work, and Construct One

May 15, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved