Owner Context Spoofing Vulnerability in OpenClaw by OpenClaw
CVE-2026-44118

8.5HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
6 May 2026

What is CVE-2026-44118?

The OpenClaw vulnerability allows unauthorized loopback clients to impersonate the owner by manipulating the sender-owner header metadata derived from server-issued bearer tokens. This can lead to unauthorized access to operations restricted to the owner, as it bypasses owner-gated functionality. Users and administrators of OpenClaw versions prior to 2026.4.22 should review and apply recommended patches to mitigate this security risk.

Affected Version(s)

OpenClaw 0 < 2026.4.22

OpenClaw 2026.4.22

References

CVSS V4

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

vladimir tokarev (@VladimirEliTokarev)
.