LIVE NEWS
  • This Elbow Pad for My Desk Changed My Life
  • Ebola outbreak kills 65 people in eastern Democratic Republic of the Congo | Global development
  • Ryan Cohen Earns $168K From Personal eBay Listings
  • Golden Dome defenders push back on $1.2T cost estimate
  • Scientists discover giant “last titan” dinosaur, Southeast Asia’s largest ever
  • Justice Dept. Aims to Use Terrorism Laws to Target Mexican Officials
  • Ether price may 20% drop as analysts say ‘downside risks remain’
  • Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence
Cybersecurity

Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

primereportsBy primereportsMay 15, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence
Share
Facebook Twitter LinkedIn Pinterest Email


Ravie LakshmananMay 15, 2026Vulnerability / AI Security

Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

Cybersecurity researchers have disclosed a set of four security flaws in OpenClaw that could be chained to achieve data theft, privilege escalation, and persistence.

The vulnerabilities, collectively dubbed

Claw Chain

by Cyera, can permit an attacker to establish a foothold, expose sensitive data, and plant backdoors. A brief description of the flaws is below –


  • CVE-2026-44112

    (CVSS score: 9.6/6.3) – A time-of-check/time-of-use (TOCTOU) race condition vulnerability in the
    OpenShell
    managed sandbox backend that allows attackers to bypass sandbox restrictions and redirect writes outside the intended mount root. 

  • CVE-2026-44113

    (CVSS score: 7.7/6.3) – A TOCTOU race condition vulnerability in OpenShell that allows attackers to bypass sandbox restrictions and read files outside the intended mount root.

  • CVE-2026-44115

    (CVSS score: 8.8) – An incomplete list of disallowed inputs vulnerability that allows attackers to bypass allowlist validation by embedding shell expansion tokens in a
    here document
    (heredoc) body to execute unapproved commands at runtime.

  • CVE-2026-44118

    (CVSS score: 7.8) – An improper access control vulnerability that could allow non-owner loopback clients to impersonate an owner to elevate their privileges and gain control over gateway configuration, cron scheduling, and execution environment management.

Cyera said successful exploitation of CVE-2026-44112 could allow an attacker to tamper with configuration, plant backdoors, and establish persistent control over the compromised host, whereas CVE-2026-44113 could be weaponized to read system files, credentials, and internal artifacts.

Cybersecurity

The exploitation chain unfolds over four steps –

  • A malicious plugin, prompt injection, or compromised external input gains code execution inside the OpenShell sandbox.
  • Leverage CVE-2026-44113 and CVE-2026-44115 to expose credentials, secrets, and sensitive files.
  • Exploit CVE-2026-44118 to obtain owner-level control of the agent runtime.
  • Use CVE-2026-44112 to plant backdoors or make configuration changes and set up persistence.

The root cause for CVE-2026-44118, per the cybersecurity company, stems from the fact that OpenClaw trusts a client-controlled ownership flag called senderIsOwner, which signals whether the caller is authorized for owner-only tools, without validating it against the authenticated session.

“The MCP loopback runtime now issues separate owner and non-owner bearer tokens and derives senderIsOwner exclusively from which token authenticated the request,” OpenClaw detailed the fixes in an advisory for the flaw. “The spoofable sender-owner header is no longer emitted or trusted.”

Following responsible disclosure, all four vulnerabilities have been addressed in OpenClaw version 2026.4.22. Security researcher Vladimir Tokarev has been credited with discovering and reporting the issues. Users are advised to update to the latest version to stay protected against potential threats.

“By weaponizing the agent’s own privileges, an adversary moves through data access, privilege escalation, and persistence — using the agent as their hands inside the environment,” Cyera said. “Each step looks like normal agent behavior to traditional controls, broadening blast radius and making detection significantly harder.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe 3 big takeaways from historic meeting in Beijing
Next Article Ether price may 20% drop as analysts say ‘downside risks remain’
primereports
  • Website

Related Posts

Cybersecurity

American Lending Center Data Breach Affects 123,000 Individuals

May 15, 2026
Cybersecurity

Fragnesia: New Linux kernel LPE bug was spawned by Dirty Frag patch (CVE-2026-46300)

May 14, 2026
Cybersecurity

Major tech manufacturer Foxconn confirms cyberattack hit North American factories

May 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20265 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • This Elbow Pad for My Desk Changed My Life
  • Ebola outbreak kills 65 people in eastern Democratic Republic of the Congo | Global development
  • Ryan Cohen Earns $168K From Personal eBay Listings
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.