CVSS 9.9CVE-2026-28466CVE-2026-28470CVE-2026-32922

Multiple Vulnerabilities in OpenClaw Expose Systems to RCE

Critical vulnerabilities in OpenClaw versions before 2026.3.11 can lead to remote code execution and privilege escalation. Update now!

Published on

Multiple critical vulnerabilities have been discovered in OpenClaw, potentially leading to remote code execution and privilege escalation. These vulnerabilities affect versions prior to 2026.3.11. Immediate patching is strongly advised to mitigate these risks.

These CVEs have critical severity scores, indicating a high risk of exploitation and system compromise.

What is Openclaw?

Openclaw is a component for other, providing [PLACEHOLDER: add a short description of its primary function here]. It is used to [PLACEHOLDER: add a typical use case here]. To learn more, you can search all openclaw CVEs. Openclaw is a critical part of many other deployments, so ensuring its security is paramount. Failing to patch vulnerabilities in Openclaw can lead to significant security breaches and system compromise.

CVE-2026-28466: Remote Code Execution via Node Invoke Approval Bypass

CVSS9.9
Affected versionsOpenClaw versions prior to 2026.2.14 are vulnerable. This vulnerability requires valid gateway credentials to exploit.

Critical severity: remote code execution with minimal prerequisites.

EPSS score of 0.099 indicates a moderate probability of exploitation.

This vulnerability allows attackers with valid gateway credentials to bypass exec approval gating for system.run commands. By injecting approval control fields, attackers can execute arbitrary commands on connected node hosts.

How to fix CVE-2026-28466 in Openclaw

Patch immediately
  1. 1.Update OpenClaw to version 2026.2.14 or later.
Update OpenClaw
composer update openclaw

Workaround: No known workaround.

NextGuard automatically flags CVE-2026-28466 if Openclaw appears in any of your monitored projects — no manual lookup required.

CVE-2026-28470: Exec Allowlist Bypass via Command Substitution in Double Quotes

CVSS9.8
Affected versionsOpenClaw versions prior to 2026.2.2 are vulnerable. This vulnerability requires exec approvals to be enabled.

Critical severity: allows arbitrary command execution via allowlist bypass.

EPSS score of 0.092 indicates a moderate probability of exploitation.

This vulnerability allows attackers to bypass the exec approvals allowlist by injecting command substitution syntax within double-quoted strings. Attackers can embed unescaped $() or backticks to execute unauthorized commands.

How to fix CVE-2026-28470 in Openclaw

Patch immediately
  1. 1.Update OpenClaw to version 2026.2.2 or later.
Update OpenClaw
composer update openclaw

Workaround: Disable exec approvals or carefully sanitize input to prevent command substitution.

NextGuard automatically flags CVE-2026-28470 if Openclaw appears in any of your monitored projects — no manual lookup required.

CVE-2026-32922: Privilege Escalation via Unvalidated Scope in device.token.rotate

CVSS9.9
Affected versionsOpenClaw versions before 2026.3.11 are vulnerable. Exploitation requires the attacker to have operator.pairing scope.

Critical severity: allows privilege escalation to admin level.

EPSS score of 0.214 indicates a relatively high probability of exploitation.

This vulnerability allows attackers with operator.pairing scope to mint tokens with broader scopes. By failing to constrain newly minted scopes, attackers can obtain operator.admin tokens for paired devices.

How to fix CVE-2026-32922 in Openclaw

Patch immediately
  1. 1.Update OpenClaw to version 2026.3.11 or later.
Update OpenClaw
composer update openclaw

Workaround: Restrict access to the device.token.rotate API and carefully validate scopes.

NextGuard automatically flags CVE-2026-32922 if Openclaw appears in any of your monitored projects — no manual lookup required.

Stay ahead of other vulnerabilities

Proactively identify and remediate vulnerabilities in your other dependencies. monitor your other dependencies to prevent potential exploits.

Compare Plans

Frequently asked questions

These vulnerabilities pose a significant risk to OpenClaw deployments. Ensure you have applied the necessary patches and continue to see all other vulnerabilities to maintain a secure environment. Regularly monitoring your dependencies is crucial.

Related topics

Remote Code ExecutionPrivilege EscalationVulnerability ManagementPatchingOpenClaw