Description
OpenClaw before 2026.3.31 contains a wide-area discovery vulnerability allowing arbitrary tailnet peers to be accepted as DNS authorities. Attackers with same-tailnet position and CA-trusted endpoint access can exfiltrate operator credentials through DNS steering manipulation.
Problem types
CWE-346: Origin Validation Error
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
Nathan (@nexrin)
KeenSecurityLab
qclawer
References
github.com/...enclaw/security/advisories/GHSA-q9w8-cf67-r238 (GitHub Security Advisory (GHSA-q9w8-cf67-r238))
github.com/...ommit/a23c33a681f8c1b22dc793995acc4c5c4b568346 (Patch Commit)
www.vulncheck.com/...al-exfiltration-via-wide-area-discovery (VulnCheck Advisory: OpenClaw < 2026.3.31 - Arbitrary DNS Authority Acceptance and Credential Exfiltration via Wide-Area Discovery)