Description
OpenClaw before 2026.3.22 contains a service discovery vulnerability where TXT metadata from Bonjour and DNS-SD could influence CLI routing even when actual service resolution failed. Attackers can exploit unresolved hints to steer routing decisions to unintended targets by providing malicious discovery metadata.
Problem types
CWE-345: Insufficient Verification of Data Authenticity
Product status
Any version before 2026.3.22
2026.3.22 (semver)
Credits
Nathan (@nexrin)
KeenSecurityLab
References
github.com/...enclaw/security/advisories/GHSA-rvqr-hrcc-j9vv (GitHub Security Advisory (GHSA-rvqr-hrcc-j9vv))
github.com/...ommit/630f1479c44f78484dfa21bb407cbe6f171dac87 (Patch Commit #1)
github.com/...ommit/deecf68b59a9b7eea978e40fd3c2fe543087b569 (Patch Commit #2)
www.vulncheck.com/...outing-via-bonjour-and-dns-sd-discovery (VulnCheck Advisory: OpenClaw < 2026.3.22 - Unresolved Service Metadata Routing via Bonjour and DNS-SD Discovery)