Policy Bypass in OpenClaw Affects Authorized Command Execution
CVE-2026-35648

2.3LOW

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
10 April 2026

What is CVE-2026-35648?

OpenClaw versions prior to 2026.3.22 are susceptible to a policy bypass vulnerability. This issue arises when queued node actions are not properly revalidated against current command policies upon delivery. Consequently, attackers can leverage outdated allowlists or previously declared privileges that remain intact even after the implementation of policy enhancements, potentially leading to the execution of unauthorized commands within the system. It is crucial for users to upgrade to the latest version to mitigate this risk.

Affected Version(s)

OpenClaw 0 < 2026.3.22

OpenClaw 2026.3.22

References

CVSS V4

Score:
2.3
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Peng Zhou (@zpbrent)
.