CVE-2026-32898

OpenClaw versions prior to 2026.2.23 contain an authorization bypass vulnerability in the ACP client that auto-approves tool calls based on untrusted toolCall.kind metadata and permissive name heuristics. Attackers can bypass interactive approval prompts for read-class operations by spoofing tool metadata or using non-core read-like names to reach auto-approve paths.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

No history.

Information

Published : 2026-03-21 01:17

Updated : 2026-03-24 21:07


NVD link : CVE-2026-32898

Mitre link : CVE-2026-32898

CVE.ORG link : CVE-2026-32898


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-807

Reliance on Untrusted Inputs in a Security Decision