Untriaged
Permalink
CVE-2026-43535
6.8 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): NONE
Activity log
- Created suggestion
OpenClaw < 2026.4.14 - Authorization Context Reuse in Collect-Mode Queue Batches
OpenClaw before 2026.4.14 contains an authorization context reuse vulnerability in collect-mode queue batches that allows messages from different senders to inherit the final sender's authorization context. Attackers can exploit this by sending multiple queued messages to drain batches using a more privileged sender's context, causing earlier messages to execute with elevated permissions.
References
-
GitHub Security Advisory (GHSA-jwrq-8g5x-5fhm) vendor-advisory
-
Patch Commit patch
Affected products
OpenClaw
- ==2026.4.14
- <2026.4.14
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>
-
@mkg20001 Maciej Krüger <mkg20001+nix@gmail.com>