Home

Description

OpenClaw before 2026.4.23 contains an improper access control vulnerability in the gateway tool's config.apply and config.patch operations that allows compromised models to write unsafe configuration changes by bypassing an incomplete denylist protection. Attackers can persist malicious config modifications affecting command execution, network behavior, credentials, and operator policies that survive restart.

PUBLISHED Reserved 2026-05-08 | Published 2026-05-11 | Updated 2026-05-11 | Assigner VulnCheck




HIGH: 7.7CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Incomplete List of Disallowed Inputs

Product status

Default status
unaffected

Any version before 2026.4.23
affected

2026.4.23 (semver)
unaffected

Credits

zsx (@zsxsoft) reporter

KeenSecurityLab coordinator

References

github.com/...enclaw/security/advisories/GHSA-cwj3-vqpp-pmxr (GitHub Security Advisory (GHSA-cwj3-vqpp-pmxr)) vendor-advisory

github.com/...ommit/bceda6089aa7b3695cc7696b43c61ae3d01bb0ec (Patch Commit) patch

www.vulncheck.com/...tation-via-gateway-tool-denylist-bypass (VulnCheck Advisory: OpenClaw < 2026.4.23 - Unsafe Config Mutation via Gateway Tool Denylist Bypass) third-party-advisory

cve.org (CVE-2026-45006)

nvd.nist.gov (CVE-2026-45006)

Download JSON