OpenClaw Vulnerabilities Enable Potential Agent Takeover
Cyera's research team disclosed four previously unknown vulnerabilities in the open-source OpenClaw autonomous agent platform, according to reporting by CybersecurityNews and Cryptika. The flaws include CVE-2026-44112 (CVSS 9.6), CVE-2026-44115 (CVSS 8.8), CVE-2026-44118 (CVSS 7.8), and CVE-2026-44113 (CVSS 7.7); CybersecurityNews and Cryptika report that all four have since been patched. The combined exploit chain, labeled "Claw Chain" by Cyera, can enable sandbox breakouts, credential exfiltration, owner-level escalation via a client-controlled senderIsOwner flag, and path-swapping TOCTOU reads, CybersecurityNews and Cryptika say. CybersecurityNews and Cryptika estimate roughly 245,000 publicly accessible OpenClaw instances were exposed prior to patches. Industry stakeholders should prioritize verifying patches, scanning deployments, and monitoring for indicators of compromise, per the reporting.
What happened
Cyera's research team identified and disclosed four previously unknown vulnerabilities in the open-source platform OpenClaw, reporting to maintainers in April 2026, according to CybersecurityNews and Cryptika. The four tracked CVEs are CVE-2026-44112 (CVSS 9.6), CVE-2026-44115 (CVSS 8.8), CVE-2026-44118 (CVSS 7.8), and CVE-2026-44113 (CVSS 7.7), as detailed in CybersecurityNews and Cryptika. CybersecurityNews and Cryptika report that OpenClaw maintainers have applied patches to address the flaws.
Technical details
CybersecurityNews and Cryptika summarize the root issues as follows
CVE-2026-44112 is a time-of-check/time-of-use (TOCTOU) race condition in the OpenShell sandbox that can redirect write operations outside the sandbox boundary, allowing persistent backdoor placement, per the reporting. CVE-2026-44115 describes a gap between command validation and shell execution that can leak environment variables, including API keys and tokens, through unquoted heredocs. CVE-2026-44118 involves acceptance of a client-controlled ownership flag, senderIsOwner, without cross-referencing the authenticated session, enabling escalation to owner-level control when combined with a valid bearer token. CVE-2026-44113 is a TOCTOU pattern in read operations that permits swapping validated file paths with symbolic links to expose system files. CybersecurityNews and Cryptika report that Cyera labels the combined exploitation pathway "Claw Chain."
Industry context
Editorial analysis: Platforms that connect language models to filesystems and external services increase attack surface because they often carry privileged access. Public reporting indicates OpenClaw integrates LLM-driven agents with filesystems, SaaS connectors, and execution environments, which raises the value of any foothold for an attacker. Chains that combine sandbox escape, credential leakage, and ownership escalation present high-risk paths from a single compromise to persistent host-level control. Organizations that deploy agent frameworks face a mix of traditional application vulnerabilities and agent-specific vectors such as prompt injection and plugin supply-chain risk.
Context and significance
Editorial analysis: CybersecurityNews and Cryptika estimate about 245,000 publicly accessible OpenClaw instances were exposed before patches, a scale that amplifies risk for enterprises and third-party integrations. The highest-severity CVE reported, CVE-2026-44112 (CVSS 9.6), underlines the potential for remote write escapes to establish persistence. The presence of both TOCTOU and command-validation gaps in the same platform exemplifies how composition of multiple moderate and high issues can produce critical chains in agent ecosystems. For organizations running agent platforms, the primary operational impact is elevated risk of credential theft, lateral movement, and persistent backdoors rather than a single isolated data leak.
What to watch
For practitioners: Monitor vendor and upstream repositories for applied patches and advisory notes; verify applied versions across environments and container images. Watch for indicators of compromise discussed in public reporting, such as unexpected outbound connections from agent runtimes, changes to scheduled executions, or newly installed persistent services. Industry observers should also track third-party marketplaces and plugin ecosystems, CybersecurityNews and related reporting note marketplace and plugin vectors in OpenClaw deployments. Finally, watch for post-patch disclosures or exploit evidence from incident response firms that could indicate whether attackers weaponized the Claw Chain prior to remediation.
Bottom line
Editorial analysis: The event reinforces established patterns in AI agent security: platforms that bridge LLMs to operational systems materially expand attacker incentives, and multiple vulnerabilities in different layers can be chained into full-agent or host takeover. Practitioners should treat agent frameworks with the same layered security scrutiny applied to traditional platform software and prioritize rapid patch verification, inventorying of public-facing instances, and monitoring for behavioral anomalies.
Scoring Rationale
A multi-CVE exploit chain affecting an agent platform with an estimated **245,000** public instances and a **9.6**-severity CVE represents a major security event for practitioners, with industry-wide implications for agent deployments.
Practice interview problems based on real data
1,500+ SQL & Python problems across 15 industry datasets — the exact type of data you work with.
Try 250 free problems


