CVE-2026-43578

OpenClaw · Sandbox Browser

OpenClaw contains a privilege escalation vulnerability where heartbeat owner downgrade detection misses async execution completion events.

Executive summary

A privilege escalation vulnerability in OpenClaw allows attackers to execute code in a more privileged context than originally intended.

Vulnerability

The application fails to correctly track privilege levels during asynchronous execution completion events. An attacker can provide malicious content to trigger this logic error, resulting in elevated privileges.

Business impact

Successful exploitation allows an attacker to break out of lower-privileged contexts to gain higher system or application-level access. With a 9.1 CVSS score, this flaw presents a significant risk for lateral movement and total system compromise.

Remediation

Immediate Action: Update OpenClaw to version 2026.4.10 or later.

Proactive Monitoring: Monitor for anomalous process execution or unexpected privilege changes within the application's runtime.

Compensating Controls: Apply the principle of least privilege to all service accounts and utilize container or OS-level sandboxing to restrict the impact of potential privilege escalation.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Organizations should prioritize upgrading their OpenClaw instances to address this privilege escalation flaw, ensuring that internal security boundaries remain intact.