Authorization Context Reuse Vulnerability in OpenClaw by OpenClaw
CVE-2026-43535

7.6HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
5 May 2026

What is CVE-2026-43535?

OpenClaw prior to version 2026.4.14 is vulnerable due to an authorization context reuse issue in collect-mode queue batches. This flaw permits messages from diverse senders to improperly leverage the final sender's authorization context. Attackers can exploit this vulnerability by queuing multiple messages, which can lead to them being executed with elevated permissions of a more privileged sender, thereby compromising the integrity and security of the system.

Affected Version(s)

OpenClaw 0 < 2026.4.14

OpenClaw 2026.4.14

References

CVSS V4

Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zsx (@zsxsoft)
KeenSecurityLab
qclawer
.