SB2026043086 - Multiple vulnerabilities in OpenClaw



SB2026043086 - Multiple vulnerabilities in OpenClaw

Published: April 30, 2026

Security Bulletin ID SB2026043086
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Improper Neutralization of Special Elements in Output Used by a Downstream Component (CVE-ID: N/A)

The vulnerability allows a remote user to alter OpenClaw runtime behavior.

The vulnerability exists due to improper neutralization of externally controlled input in workspace .env loading when processing a malicious workspace .env file. A remote user can supply a crafted .env file to alter OpenClaw runtime behavior.


2) Protection Mechanism Failure (CVE-ID: N/A)

The vulnerability allows a remote user to read disallowed local files.

The vulnerability exists due to protection mechanism failure in browser interaction routes when triggering interaction-driven navigations into the local CDP origin. A remote user can cause navigation to the local CDP origin and then create or read disallowed file:// pages to read disallowed local files.

The issue occurs despite direct navigation guards.


3) Inclusion of Functionality from Untrusted Control Sphere (CVE-ID: N/A)

The vulnerability allows a remote user to auto-enable an untrusted provider plugin.

The vulnerability exists due to inclusion of functionality from an untrusted control sphere in workspace provider auth choices when performing non-interactive onboarding during auth setup. A remote user can shadow a provider auth choice with an untrusted workspace plugin to auto-enable an untrusted provider plugin.

Untrusted workspace choices are involved only when they are not explicitly enabled.


Remediation

Install update from vendor's website.