OpenClaw versions prior to 2026.2.23 contain an authorization bypass vulnerability in the ACP client that auto-approves tool calls based on untrusted toolCall.kind metadata and permissive name heuristics. Attackers can bypass interactive approval prompts for read-class operations by spoofing tool metadata or using non-core read-like names to reach auto-approve paths.
References
Configurations
History
No history.
Information
Published : 2026-03-21 01:17
Updated : 2026-03-24 21:07
NVD link : CVE-2026-32898
Mitre link : CVE-2026-32898
CVE.ORG link : CVE-2026-32898
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-807
Reliance on Untrusted Inputs in a Security Decision
