
"The attack chain works in four stages. First, a malicious plugin, prompt injection, or compromised external input gains code execution inside the OpenShell sandbox. Second, two of the vulnerabilities, CVE-2026-44113 and CVE-2026-44115, are exploited to expose credentials, secrets, and sensitive files. Third, CVE-2026-44118 is used to obtain owner-level control of the agent runtime by exploiting an improperly validated ownership flag. Fourth, CVE-2026-44112, the most severe of the four with a CVSS score of 9.6, is used to plant backdoors, modify configuration, and establish persistence outside the sandbox."
"The most architecturally interesting flaw is CVE-2026-44118, which stems from OpenClaw trusting a client-controlled flag called senderIsOwner without validating it against the authenticated session. Any non-owner loopback client could impersonate an owner and gain control over gateway configuration, cron scheduling, and execution environment management. The fix, according to OpenClaw's advisory, involves issuing separate owner and non-owner bearer tokens, with senderIsOwner now derived exclusively from the authenticating token rather than from a spoofable header."
"The two TOCTOU (time-of-check/time-of-use) race conditions, CVE-2026-44112 and CVE-2026-44113, allow attackers to bypass sandbox restrictions and redirect file writes or reads outside the intended mount root. CVE-2026-44115 exploits an incomplete allowlist by embedding shell expansion tokens inside a heredoc body, enabling execution of commands that would otherwise be blocked a"
Four vulnerabilities in OpenClaw enable a chained attack that begins with code execution inside the OpenShell managed sandbox via a malicious plugin, prompt injection, or compromised external input. Two flaws expose credentials, secrets, and sensitive files by exploiting weaknesses in the sandbox and runtime handling. Another flaw grants owner-level control of the agent runtime by trusting a client-controlled ownership flag without validating it against the authenticated session. The final and most severe flaw plants backdoors, modifies configuration, and establishes persistence outside the sandbox. The fixes include issuing separate owner and non-owner bearer tokens and deriving senderIsOwner only from the authenticating token, plus race-condition and allowlist handling corrections.
Read at TNW | Data-Security
Unable to calculate read time
Collection
[
|
...
]