Home

Description

OpenClaw before 2026.4.10 contains an input validation vulnerability that allows external hook metadata to be enqueued as trusted system events. Attackers can supply malicious hook names to escalate untrusted input into higher-trust agent context.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-05 | Updated 2026-05-06 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-345: Insufficient Verification of Data Authenticity

Product status

Default status
unaffected

Any version before 2026.4.10
affected

2026.4.10 (semver)
unaffected

Credits

zsx (@zsxsoft) reporter

qclawer tool

KeenSecurityLab coordinator

References

github.com/...enclaw/security/advisories/GHSA-7g8c-cfr3-vqqr (GitHub Security Advisory (GHSA-7g8c-cfr3-vqqr)) vendor-advisory

github.com/...ommit/e3a845bde5b54f4f1e742d0a51ba9860f9619b29 (Patch Commit) patch

www.vulncheck.com/...zed-external-input-in-agent-hook-events (VulnCheck Advisory: OpenClaw < 2026.4.10 - Unsanitized External Input in Agent Hook Events) third-party-advisory

cve.org (CVE-2026-43534)

nvd.nist.gov (CVE-2026-43534)

Download JSON