Untriaged
Permalink
CVE-2026-43534
9.1 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): NONE
Activity log
- Created suggestion
OpenClaw < 2026.4.10 - Unsanitized External Input in Agent Hook Events
OpenClaw before 2026.4.10 contains an input validation vulnerability that allows external hook metadata to be enqueued as trusted system events. Attackers can supply malicious hook names to escalate untrusted input into higher-trust agent context.
References
-
GitHub Security Advisory (GHSA-7g8c-cfr3-vqqr) vendor-advisory
-
Patch Commit patch
Affected products
OpenClaw
- <2026.4.10
- ==2026.4.10
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>
-
@mkg20001 Maciej Krüger <mkg20001+nix@gmail.com>