Key Takeaways
- Four critical flaws (CVE‑2026‑44112, CVE‑2026‑44115, CVE‑2026‑44118, CVE‑2026‑44113) in the OpenClaw platform were chained together by attackers to achieve remote code execution, credential theft, privilege escalation, and persistent backdoors.
- The combined attack chain, dubbed “Claw Chain,” leverages the AI agent’s own privileged access to mimic legitimate behavior, evading many traditional security controls.
- Shodan and ZoomEye data from May 2026 indicate roughly 245,000 publicly exposed OpenClaw instances, with financial services, healthcare, and legal sectors at highest risk.
- Immediate remediation requires applying the April 23 2026 patches, rotating all secrets reachable by OpenClaw processes, restricting public access, and treating agent deployments as privileged identities.
- Ongoing defenses should include continuous asset discovery, strict least‑privilege enforcement, and monitoring for anomalous agent behavior that resembles normal workflows.
Overview of OpenClaw and Its Appeal
OpenClaw, originally released as “Clawdbot” in late 2025, is an open‑source framework that tightly couples large language models with filesystems, SaaS applications, credential stores, and execution environments. Enterprises have embraced it for IT automation, customer‑service pipelines, and integrations with platforms such as Telegram, Discord, and Microsoft Agent 365. Because agents routinely operate with broad privileges—reading configuration files, invoking APIs, and modifying system state—OpenClaw deployments represent a high‑value target for attackers seeking to abuse trusted AI‑driven automation.
Discovery and Responsible Disclosure
In April 2026, Cyera’s security research team identified four previously undisclosed vulnerabilities affecting OpenClaw. The findings were reported privately to the project maintainers, who promptly developed and released patches on April 23 2026. All four flaws have since been assigned CVE identifiers and are tracked under the corresponding GHSA advisories (GHSA‑5h3g‑6xhh‑rg6p, GHSA‑wppj‑c6mr‑83jj, GHSA‑r6xh‑pqhr‑v4xh, GHSA‑x3h8‑jrgh‑p8jx). The coordinated disclosure gave organizations a narrow window to apply fixes before public exploit details circulated.
Technical Breakdown of the Four Vulnerabilities
CVE‑2026‑44112 – TOCTOU Race in Write Operations (CVSS 9.6, Critical)
A time‑of‑check/time‑of‑use (TOCTOU) flaw in the OpenShell sandbox permits an attacker to redirect write attempts outside the sandbox boundary. By racing between the validation of a target path and the actual write, malicious code can overwrite host‑level configuration files or drop persistent backdoors that survive agent restarts.
CVE‑2026‑44115 – Credential Leak via Unquoted Heredocs (CVSS 8.8, High)
OpenClaw’s command‑validation logic fails to properly quote heredoc delimiters, allowing environment variables—such as API keys, tokens, and other secrets—to leak during shell execution. Although the input appears safe at validation time, the subsequent expansion exposes sensitive data to any process that can influence the command line.
CVE‑2026‑44118 – Insufficient Owner‑Flag Verification (CVSS 7.8, High)
The platform trusts a client‑supplied senderIsOwner flag without cross‑checking it against the authenticated session. A local process holding a valid bearer token can therefore falsely assert ownership and gain owner‑level control over gateway configuration, task scheduling, and execution management, effectively elevating its privileges within the agent runtime.
CVE‑2026‑44113 – TOCTOU Race in Read Operations (CVSS 7.7, High)
Mirroring the write‑side issue, a TOCTOU condition in file‑read logic lets attackers swap a validated path with a symbolic link pointing outside the permitted mount root. This enables unauthorized reading of system files, internal logs, or other artifacts that the agent was never intended to access, facilitating reconnaissance and data exfiltration.
The Claw Chain Attack Flow
When combined, these flaws form a potent multi‑stage attack chain that Cyera labeled “Claw Chain.” The typical progression is as follows:
- Foothold – An attacker gains initial code execution inside the OpenShell sandbox, for example by uploading a malicious plugin or exploiting a prompt‑injection vulnerability that the LLM mistakenly executes.
- Exfiltration – Leveraging CVE‑2026‑44113 (read‑side TOCTOU) and CVE‑2026‑44115 (heredoc credential leak), the adversary harvests secrets, API tokens, and sensitive files accessible to the agent.
- Privilege Escalation – Using CVE‑2026‑44118, the attacker abuses the unverified
senderIsOwnerflag to elevate to owner‑level control over the agent’s runtime, gaining the ability to reconfigure schedules, modify gateway settings, and invoke arbitrary commands. - Persistence – Finally, CVE‑2026‑44112 is exploited to plant a backdoor or alter configuration files outside the sandbox, ensuring the foothold survives reboots, updates, or agent restarts.
Because each step imitates legitimate agent activity—reading files, executing commands, updating configurations—traditional signature‑based or anomaly‑detection tools often struggle to differentiate malicious behavior from normal automation, making detection particularly challenging.
Exposure Landscape and Sector‑Specific Risk
Internet‑wide scans conducted via Shodan and ZoomEye in May 2026 revealed approximately 65,000 and 180,000 publicly reachable OpenClaw instances, respectively, for a combined total of roughly 245,000 exposed servers. The sheer volume underscores the widespread adoption of the platform across industries.
Organizations in financial services, healthcare, and legal sectors face the greatest danger, as their OpenClaw workflows frequently process personally identifiable information (PII), protected health information (PHI), or high‑value credentials such as banking keys and legal case management tokens. A successful Claw Chain compromise in these environments could lead to massive data breaches, regulatory penalties, and erosion of customer trust.
Remediation Guidance for Affected Organizations
Given the severity and chaining potential of the vulnerabilities, Cyera advises treating the issue as a Priority 1 incident and taking the following actions immediately:
- Patch Promptly – Apply the April 23 2026 fixes covering GHSA‑5h3g‑6xhh‑rg6p, GHSA‑wppj‑c6mr‑83jj, GHSA‑r6xh‑pqhr‑v4xh, and GHSA‑x3h8‑jrgh‑p8jx to all OpenClaw deployments.
- Secret Rotation – Assume any environment variable, API key, or credential reachable by an OpenClaw process may already be compromised. Rotate all such secrets and update associated applications.
- Asset Discovery and Segmentation – Identify exposed instances using Shodan, ZoomEye, or internal inventory tools. Place remaining public‑facing agents behind strong authentication, VPNs, or firewall rules, enforcing least‑principle network access.
- Privileged Identity Management – Treat OpenClaw agents as privileged service accounts. Enforce strict lifecycle controls, including just‑in‑time provisioning, regular access reviews, and mandatory multi‑factor authentication for any administrative interaction.
- Behavioral Monitoring – Deploy endpoint detection and response (EDR) or cloud‑native security solutions that monitor for anomalous agent behavior—such as unexpected file reads outside sanctioned mounts, outbound connections to unfamiliar endpoints, or rapid changes to scheduler configurations—even when those actions mimic normal automation patterns.
Conclusion and Forward‑Looking Recommendations
The Claw Chain incident highlights a growing class of risks inherent to AI‑agent platforms that bridge powerful language models with privileged system access. As organizations continue to adopt LLM‑driven automation for efficiency gains, security teams must expand threat models to encompass credential leakage, TOCTOU races, and insufficient authorization checks that can be chained together to subvert trusted workflows.
Beyond immediate patching, firms should invest in secure‑by‑design practices for agent development: input validation that eliminates unquoted heredocs, sandboxen that enforce immutable boundaries regardless of race conditions, and explicit verification of ownership claims against authenticated identities. Regular red‑team exercises focused on agent‑specific attack surfaces will also help uncover similar chains before they are exploited in the wild.
By treating OpenClaw (and comparable frameworks) as critical infrastructure—subject to the same rigor applied to traditional privileged systems—enterprises can harness the benefits of AI automation while minimizing the exposure to sophisticated, stealthy threat actors.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates.

