{"id":130,"date":"2026-05-15T15:33:14","date_gmt":"2026-05-15T15:33:14","guid":{"rendered":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/"},"modified":"2026-05-15T15:33:14","modified_gmt":"2026-05-15T15:33:14","slug":"four-chained-openclaw-flaws-threaten-full-system-takeover","status":"publish","type":"post","link":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/","title":{"rendered":"Four Chained OpenClaw Flaws Threaten Full System Takeover"},"content":{"rendered":"<h2>Overview<\/h2>\n<p>Cybersecurity researchers at Cyera have uncovered a dangerous set of four security vulnerabilities in OpenClaw that can be chained together to achieve data theft, privilege escalation, and persistent system compromise. Dubbed &#8220;Claw Chain,&#8221; this exploit chain allows a threat actor to move through an environment using the AI agent&#8217;s own privileges \u2014 making malicious activity nearly indistinguishable from normal operations.<\/p>\n<h2>The Four Vulnerabilities<\/h2>\n<p>The Claw Chain attack leverages four distinct CVEs, each playing a specific role in the overall compromise:<\/p>\n<p>**CVE-2026-44112** (CVSS 9.6\/6.3) \u2014 A time-of-check\/time-of-use (TOCTOU) race condition in OpenClaw&#8217;s OpenShell managed sandbox backend. Exploitation allows attackers to bypass sandbox restrictions and redirect file writes outside the intended mount root. This is the most critical flaw, enabling backdoor planting and persistent configuration changes.<\/p>\n<p>**CVE-2026-44113** (CVSS 7.7\/6.3) \u2014 Another TOCTOU race condition in OpenShell, this time enabling unauthorized read access to files outside the sandbox boundary. Attackers can leverage this to extract system files, credentials, and internal application artifacts.<\/p>\n<p>**CVE-2026-44115** (CVSS 8.8) \u2014 An incomplete input validation flaw that allows attackers to bypass allowlist enforcement by embedding shell expansion tokens inside heredoc bodies. This enables execution of unapproved commands at runtime, effectively breaking the command execution controls.<\/p>\n<p>**CVE-2026-44118** (CVSS 7.8) \u2014 An improper access control vulnerability in the MCP loopback runtime. Non-owner clients can spoof the `senderIsOwner` flag \u2014 a client-controlled ownership header \u2014 to impersonate owner-level sessions without proper authentication validation, granting control over gateway configuration, cron scheduling, and execution environment management.<\/p>\n<h2>The Attack Chain Explained<\/h2>\n<p>The Claw Chain attack unfolds in four calculated stages. First, an attacker gains initial code execution inside the OpenShell sandbox \u2014 this can be triggered via a malicious plugin, prompt injection, or any compromised external input. From there, CVE-2026-44113 and CVE-2026-44115 are chained to expose credentials, secrets, and sensitive files stored on the system.<\/p>\n<p>With credentials in hand, CVE-2026-44118 is exploited to elevate privileges to owner-level control over the agent runtime. Finally, CVE-2026-44112 is used to plant backdoors, alter configurations, and establish persistence \u2014 ensuring the attacker maintains long-term access even after initial discovery attempts.<\/p>\n<p>Cyera noted that each step in this chain mimics legitimate agent behavior, making detection by traditional security controls significantly harder and broadening the attacker&#8217;s blast radius within compromised environments.<\/p>\n<h2>Root Cause and the Fix<\/h2>\n<p>The core issue behind CVE-2026-44118 is OpenClaw&#8217;s unconditional trust of the client-controlled `senderIsOwner` header, which was never validated against the authenticated session context. This design flaw effectively allowed any loopback client to self-declare owner-level privileges.<\/p>\n<p>Following responsible disclosure by security researcher Vladimir Tokarev, all four vulnerabilities have been patched in **OpenClaw version 2026.4.22**. The fix introduces separate owner and non-owner bearer tokens for the MCP loopback runtime, with `senderIsOwner` now derived exclusively from which token authenticated the request. The spoofable sender-owner header has been fully deprecated.<\/p>\n<h2>CyDhaal Recommendation<\/h2>\n<p>If your environment runs any version of OpenClaw prior to 2026.4.22, updating immediately is critical. Given the CVSS scores involved \u2014 particularly the near-perfect 9.6 for CVE-2026-44112 \u2014 and the ease with which these flaws can be chained, this is not a vulnerability set to defer. Organizations leveraging AI agent frameworks should also audit all plugin inputs and external data sources for potential prompt injection vectors as an additional defensive layer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers have disclosed four chained vulnerabilities in OpenClaw, collectively dubbed Claw Chain, enabling attackers to steal data, escalate privileges, and establish persistence through the AI agent&#8217;s own runtime. All flaws have been patched in OpenClaw version 2026.4.22 and users are urged to update immediately.<\/p>\n","protected":false},"author":2,"featured_media":129,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-130","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Four Chained OpenClaw Flaws Threaten Full System Takeover - CyDhaal - Your Daily Dose of Cyber Intelligence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Four Chained OpenClaw Flaws Threaten Full System Takeover - CyDhaal - Your Daily Dose of Cyber Intelligence\" \/>\n<meta property=\"og:description\" content=\"Researchers have disclosed four chained vulnerabilities in OpenClaw, collectively dubbed Claw Chain, enabling attackers to steal data, escalate privileges, and establish persistence through the AI agent&#039;s own runtime. All flaws have been patched in OpenClaw version 2026.4.22 and users are urged to update immediately.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/\" \/>\n<meta property=\"og:site_name\" content=\"CyDhaal - Your Daily Dose of Cyber Intelligence\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-15T15:33:14+00:00\" \/>\n<meta name=\"author\" content=\"CyDhaal Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CyDhaal Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/\"},\"author\":{\"name\":\"CyDhaal Team\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#\\\/schema\\\/person\\\/08fa1720ed7b28432dc0b56a00e0fdae\"},\"headline\":\"Four Chained OpenClaw Flaws Threaten Full System Takeover\",\"datePublished\":\"2026-05-15T15:33:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/\"},\"wordCount\":541,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.cydhaal.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cydhaal-40.jpg\",\"articleSection\":[\"Vulnerability\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/\",\"url\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/\",\"name\":\"Four Chained OpenClaw Flaws Threaten Full System Takeover - CyDhaal - Your Daily Dose of Cyber Intelligence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.cydhaal.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cydhaal-40.jpg\",\"datePublished\":\"2026-05-15T15:33:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#\\\/schema\\\/person\\\/08fa1720ed7b28432dc0b56a00e0fdae\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.cydhaal.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cydhaal-40.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.cydhaal.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cydhaal-40.jpg\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/four-chained-openclaw-flaws-threaten-full-system-takeover\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.cydhaal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Four Chained OpenClaw Flaws Threaten Full System Takeover\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.cydhaal.com\\\/\",\"name\":\"CyDhaal - Your Daily Dose of Cyber Intelligence\",\"description\":\"Daily Cyber Threats. Zero Noise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.cydhaal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#\\\/schema\\\/person\\\/08fa1720ed7b28432dc0b56a00e0fdae\",\"name\":\"CyDhaal Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e78533e3de14d0acf42b2ac6a9a7fe0a81e2b36d6d3484de6a162f141c30f96a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e78533e3de14d0acf42b2ac6a9a7fe0a81e2b36d6d3484de6a162f141c30f96a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e78533e3de14d0acf42b2ac6a9a7fe0a81e2b36d6d3484de6a162f141c30f96a?s=96&d=mm&r=g\",\"caption\":\"CyDhaal Team\"},\"url\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/author\\\/cydhaal-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Four Chained OpenClaw Flaws Threaten Full System Takeover - CyDhaal - Your Daily Dose of Cyber Intelligence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/","og_locale":"en_US","og_type":"article","og_title":"Four Chained OpenClaw Flaws Threaten Full System Takeover - CyDhaal - Your Daily Dose of Cyber Intelligence","og_description":"Researchers have disclosed four chained vulnerabilities in OpenClaw, collectively dubbed Claw Chain, enabling attackers to steal data, escalate privileges, and establish persistence through the AI agent's own runtime. All flaws have been patched in OpenClaw version 2026.4.22 and users are urged to update immediately.","og_url":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/","og_site_name":"CyDhaal - Your Daily Dose of Cyber Intelligence","article_published_time":"2026-05-15T15:33:14+00:00","author":"CyDhaal Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CyDhaal Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/#article","isPartOf":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/"},"author":{"name":"CyDhaal Team","@id":"https:\/\/blog.cydhaal.com\/#\/schema\/person\/08fa1720ed7b28432dc0b56a00e0fdae"},"headline":"Four Chained OpenClaw Flaws Threaten Full System Takeover","datePublished":"2026-05-15T15:33:14+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/"},"wordCount":541,"commentCount":0,"image":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-40.jpg","articleSection":["Vulnerability"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/","url":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/","name":"Four Chained OpenClaw Flaws Threaten Full System Takeover - CyDhaal - Your Daily Dose of Cyber Intelligence","isPartOf":{"@id":"https:\/\/blog.cydhaal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/#primaryimage"},"image":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-40.jpg","datePublished":"2026-05-15T15:33:14+00:00","author":{"@id":"https:\/\/blog.cydhaal.com\/#\/schema\/person\/08fa1720ed7b28432dc0b56a00e0fdae"},"breadcrumb":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/#primaryimage","url":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-40.jpg","contentUrl":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-40.jpg","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/four-chained-openclaw-flaws-threaten-full-system-takeover\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.cydhaal.com\/"},{"@type":"ListItem","position":2,"name":"Four Chained OpenClaw Flaws Threaten Full System Takeover"}]},{"@type":"WebSite","@id":"https:\/\/blog.cydhaal.com\/#website","url":"https:\/\/blog.cydhaal.com\/","name":"CyDhaal - Your Daily Dose of Cyber Intelligence","description":"Daily Cyber Threats. Zero Noise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.cydhaal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.cydhaal.com\/#\/schema\/person\/08fa1720ed7b28432dc0b56a00e0fdae","name":"CyDhaal Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e78533e3de14d0acf42b2ac6a9a7fe0a81e2b36d6d3484de6a162f141c30f96a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e78533e3de14d0acf42b2ac6a9a7fe0a81e2b36d6d3484de6a162f141c30f96a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e78533e3de14d0acf42b2ac6a9a7fe0a81e2b36d6d3484de6a162f141c30f96a?s=96&d=mm&r=g","caption":"CyDhaal Team"},"url":"https:\/\/blog.cydhaal.com\/index.php\/author\/cydhaal-team\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/posts\/130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":0,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/posts\/130\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/media\/129"}],"wp:attachment":[{"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/media?parent=130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/categories?post=130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/tags?post=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}