Multiple critical vulnerabilities have been discovered in OpenClaw, potentially leading to remote code execution and privilege escalation. These vulnerabilities affect versions prior to 2026.3.11. Immediate patching is strongly advised to mitigate these risks.
These CVEs have critical severity scores, indicating a high risk of exploitation and system compromise.
What is Openclaw?
CVE-2026-28466: Remote Code Execution via Node Invoke Approval Bypass
Critical severity: remote code execution with minimal prerequisites.
EPSS score of 0.099 indicates a moderate probability of exploitation.
This vulnerability allows attackers with valid gateway credentials to bypass exec approval gating for system.run commands. By injecting approval control fields, attackers can execute arbitrary commands on connected node hosts.
How to fix CVE-2026-28466 in Openclaw
Patch immediately- 1.Update OpenClaw to version 2026.2.14 or later.
composer update openclawWorkaround: No known workaround.
NextGuard automatically flags CVE-2026-28466 if Openclaw appears in any of your monitored projects — no manual lookup required.
CVE-2026-28470: Exec Allowlist Bypass via Command Substitution in Double Quotes
Critical severity: allows arbitrary command execution via allowlist bypass.
EPSS score of 0.092 indicates a moderate probability of exploitation.
This vulnerability allows attackers to bypass the exec approvals allowlist by injecting command substitution syntax within double-quoted strings. Attackers can embed unescaped $() or backticks to execute unauthorized commands.
How to fix CVE-2026-28470 in Openclaw
Patch immediately- 1.Update OpenClaw to version 2026.2.2 or later.
composer update openclawWorkaround: Disable exec approvals or carefully sanitize input to prevent command substitution.
NextGuard automatically flags CVE-2026-28470 if Openclaw appears in any of your monitored projects — no manual lookup required.
CVE-2026-32922: Privilege Escalation via Unvalidated Scope in device.token.rotate
Critical severity: allows privilege escalation to admin level.
EPSS score of 0.214 indicates a relatively high probability of exploitation.
This vulnerability allows attackers with operator.pairing scope to mint tokens with broader scopes. By failing to constrain newly minted scopes, attackers can obtain operator.admin tokens for paired devices.
How to fix CVE-2026-32922 in Openclaw
Patch immediately- 1.Update OpenClaw to version 2026.3.11 or later.
composer update openclawWorkaround: Restrict access to the device.token.rotate API and carefully validate scopes.
NextGuard automatically flags CVE-2026-32922 if Openclaw appears in any of your monitored projects — no manual lookup required.
Stay ahead of other vulnerabilities
Proactively identify and remediate vulnerabilities in your other dependencies. monitor your other dependencies to prevent potential exploits.
Compare PlansFrequently asked questions
These vulnerabilities pose a significant risk to OpenClaw deployments. Ensure you have applied the necessary patches and continue to see all other vulnerabilities to maintain a secure environment. Regularly monitoring your dependencies is crucial.
Related topics