Improper Process Termination in OpenClaw Affects Data Integrity
CVE-2026-35667

6.9MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
10 April 2026

What is CVE-2026-35667?

OpenClaw versions prior to 2026.3.24 are susceptible to an improper process termination vulnerability. This issue arises from an inadequate resolution of a prior vulnerability, allowing the use of the !stop chat command, which invokes the unpatched killProcessTree function from shell-utils.ts. This function sends a SIGKILL signal immediately, bypassing a graceful shutdown via SIGTERM. Consequently, attackers could exploit this flaw to trigger premature process termination, resulting in data corruption, resource leaks, and the omission of crucial security-sensitive cleanup operations.

Affected Version(s)

OpenClaw 0 < 2026.3.24

OpenClaw 2026.3.24

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Edward-x (@YLChen-007)
.