SB2026040840 - Multiple vulnerabilities in OpenClaw



SB2026040840 - Multiple vulnerabilities in OpenClaw

Published: April 8, 2026

Security Bulletin ID SB2026040840
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2026-33574)

The vulnerability allows a local user to write files outside the intended tools directory.

The vulnerability exists due to a time-of-check time-of-use race condition in the skills download installer when downloading and copying the archive into place after validating the per-skill tools root path. A local user can rebind the tools-root path between validation and the final write to write files outside the intended tools directory.


2) Authentication Bypass by Alternate Name (CVE-ID: CVE-2026-34506)

The vulnerability allows a remote user to bypass sender authorization checks.

The vulnerability exists due to improper access control in the Microsoft Teams plugin message handler when processing messages for a route with a configured team/channel allowlist and an empty groupAllowFrom setting. A remote user can send messages from an unauthorized sender within the matched team/channel to bypass sender authorization checks.

This issue only arises when groupPolicy is set to "allowlist", a route allowlist is configured, and the sender allowlist is empty.


3) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2026-32921)

The vulnerability allows a remote user to bypass approved script content constraints and execute unintended code.

The vulnerability exists due to a time-of-check time-of-use race condition in the system.run approval flow when processing interpreter-style script operands across approval and execution. A remote user can obtain approval for a command, modify the approved script before execution, and then execute different content under the previously approved command shape to bypass approved script content constraints and execute unintended code.

The issue affects mutable script operands where the approved argv values remain unchanged while the on-disk script content drifts after approval.


Remediation

Install update from vendor's website.