Improper Process Termination in OpenClaw Affects Data Integrity
CVE-2026-35667
6.9MEDIUM
What is CVE-2026-35667?
OpenClaw versions prior to 2026.3.24 are susceptible to an improper process termination vulnerability. This issue arises from an inadequate resolution of a prior vulnerability, allowing the use of the !stop chat command, which invokes the unpatched killProcessTree function from shell-utils.ts. This function sends a SIGKILL signal immediately, bypassing a graceful shutdown via SIGTERM. Consequently, attackers could exploit this flaw to trigger premature process termination, resulting in data corruption, resource leaks, and the omission of crucial security-sensitive cleanup operations.
Affected Version(s)
OpenClaw 0 < 2026.3.24
OpenClaw 2026.3.24
