Unauthorized Modifications in OpenClaw ACP Chat Commands
CVE-2026-35631

7.1HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
9 April 2026

What is CVE-2026-35631?

The vulnerability in OpenClaw prior to version 2026.3.22 allows unauthorized users to bypass authorization measures on internal ACP chat commands. Attackers can invoke these commands to perform mutating actions within the control plane without the necessary admin permissions, potentially leading to severe security implications. Immediate updates are recommended to mitigate risks associated with unauthorized modifications.

Affected Version(s)

OpenClaw 0 < 2026.3.22

OpenClaw 2026.3.22

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

tdjackey
.