Claw Chain: Cyera Research Unveil Four Chainable Vulnerabilities in OpenClaw

May 15, 2026
Share

Vulnerability Class: Sandbox escape, privilege escalation, data exposure

CVE IDs: CVE-2026-44112, CVE-2026-44115, CVE-2026-44118, CVE-2026-44113

Highest CVSS Score: 9.6  —   CRITICAL  (CVE-2026-44112)

Affected Product: OpenClaw (all versions prior to April 23, 2026 patches)

Attack Vector: Agent-mediated — prompt injection, malicious plugin, supply-chain input

Exposed Instances: ~65,000 (Shodan) · ~180,000 (Zoomeye) public-facing OpenClaw servers

Discovered By: Cyera Research

What We Found

Cyera's research team identified four previously undisclosed vulnerabilities in OpenClaw, one of the most rapidly adopted open-source platforms for autonomous AI agents. Originally launched as “Clawdbot” in late 2025, OpenClaw connects LLMs directly to filesystems, SaaS applications, credentials, and execution environments - and is increasingly deployed across enterprise workflows for IT automation, customer service, and operational integrations with platforms like Telegram, Discord, and Microsoft Agent 365.

The four findings - spanning sandbox isolation, identity, and execution validation - were disclosed to the OpenClaw maintainers in April 2026 and have all been patched.

Their combined impact points to a deeper concern: AI agents have become a primary execution surface, and the security model around them has not caught up

The Vulnerabilities

CVE-2026-44112  - TOCTOU Filesystem Write Escape CRITICAL · 9.6 

A time-of-check / time-of-use race condition in the OpenShell sandbox lets attackers redirect writes outside the sandbox boundary - enabling configuration tampering, backdoor placement, and persistent control of the host. The agent's automated write behavior amplifies impact at runtime.

CVE-2026-44115  - Execution Allowlist Env-Vars Disclosure HIGH · 8.8 

A gap between OpenClaw's command validation and shell execution allows environment variables - including API keys, tokens, and credentials - to be expanded inside unquoted heredocs, returning sensitive data through commands that appear safe at validation time.

CVE-2026-44118  - MCP Loopback Privilege Escalation HIGH · 7.8 

OpenClaw trusts a client-controlled ownership flag (senderIsOwner) without validating it against the authenticated session. A locally executing process with a valid bearer token can elevate itself to owner-level privileges and gain control over gateway configuration, cron scheduling, and execution environment management.

CVE-2026-44113 TOCTOU Filesystem Read Escape HIGH · 7.7 

The same race-condition pattern in read operations lets attackers swap a validated file path with a symbolic link pointing outside the allowed mount root - exposing system files, credentials, and internal artifacts the agent was never meant to reach.

The Attack Chain

The four vulnerabilities are individually meaningful, but their combined effect is the more important story. From a single supply-chain-style foothold, an attacker can chain three of them in parallel from one entry point:

STEP 1

Foothold: A malicious plugin, prompt injection, or compromised external input gains code execution inside the OpenShell sandbox.

STEP 2

Data Exfiltration: TOCTOU read escape (CVE-2026-44113) and env-var disclosure (CVE-2026-44115) expose credentials, secrets, and sensitive files beyond the agent's intended scope.

STEP 3

Privilege Escalation: MCP loopback flaw (CVE-2026-44118) elevates the compromised process to owner-level control of the agent runtime.

STEP 4

Persistence: TOCTOU write escape (CVE-2026-44112) plants backdoors, modifies configuration, or alters future agent behavior.

The AI Security Implication

Attackers can exploit the AI agent itself to execute the attack chain.

By weaponizing the agent's own privileges, an adversary moves through data access, privilege escalation, and persistence - using the agent as their hands inside the environment. Each step looks like normal agent behavior to traditional controls, broadening blast radius and making detection significantly harder.

What Is the Impact

OpenClaw agents typically operate with broad access to internal systems, credentials, and SaaS data - often with weaker governance than the systems they connect to.
With ~65,000 (Shodan) and ~180,000 (Zoomeye) publicly accessible OpenClaw instances as of May 2026, this exposure surface is immediate and broad.

What an Attacker Can Steal or Achieve

FROM THE AGENT RUNTIME:

  • Environment variables (API keys, tokens, secrets)
  • Bearer tokens and authentication material
  • Internal configuration and runtime artifacts

FROM THE HOST FILESYSTEM:

  • Sensitive files reachable outside the sandbox
  • System credentials and configuration files
  • Internal source code and documentation

THROUGH AGENT PRIVILEGES:

  • Data accessible via connected SaaS / enterprise systems
  • User prompts, outputs, and conversation history
  • Privileged operations (scheduling, gateway, execution)

Who Is Most at Risk

  • Enterprises using OpenClaw for IT support, business workflow automation, or customer-service agents.
  • Development teams integrating OpenClaw with messaging platforms (Telegram, Discord, Slack), enterprise systems, or agentic tooling like Microsoft Agent 365.
  • Organizations in regulated industries - financial services, healthcare, legal - where agent prompts and outputs may include PII, PHI, or privileged data.
  • Any deployment where OpenClaw is exposed to the public internet without authentication or network controls in front of it.

What You Should Do

Organizations running OpenClaw should treat this as a Priority 1 advisory and take the following actions:

Immediate Actions (Within 24 Hours)

  1. Patch OpenClaw. Apply the April 23, 2026 fixes covering GHSA-5h3g-6xhh-rg6p, GHSA-wppj-c6mr-83jj, GHSA-r6xh-pqhr-v4xh, and GHSA-x3h8-jrgh-p8jx.
  2. Identify exposed instances. Use asset inventory or external scanning (Shodan, internal recon) to locate any internet-facing OpenClaw deployments and place them behind authentication or firewall controls.
  3. Rotate secrets. Assume any environment variable or credential reachable by OpenClaw processes may be compromised. Rotate API keys, tokens, and bearer credentials immediately.

Short-Term Hardening (Within 1 Week)

  1. Audit agent access. Map what data, credentials, and systems each OpenClaw agent can reach. Reduce scope aggressively.
  2. Treat agents as privileged identities. Apply the same access scoping, monitoring, and lifecycle controls used for service accounts.
  3. Review supply chain inputs. Audit plugins, prompts, and external inputs feeding agent workflows. Restrict installation rights and require review for new plugins.
  4. Network segmentation. Place OpenClaw deployments on isolated network segments with strict egress controls to limit exfiltration paths.

How Cyera Can Help

Cyera's data security platform gives organizations the visibility and control needed to assess exposure from agentic AI vulnerabilities like Claw Chain - and to prevent data exfiltration across AI workloads.

Data Discovery & Classification

Identify sensitive data flows into AI agent systems - including what data OpenClaw agents and their plugins can reach. Cyera continuously maps where PII, credentials, proprietary code, and regulated data exist across your environment, so you know exactly what is in scope when an agent is compromised.

AI Risk Posture Assessment

Assess your organization's exposure to agentic AI infrastructure vulnerabilities. Cyera can identify unauthenticated or misconfigured AI agent endpoints, flag publicly exposed OpenClaw instances, and provide a risk-prioritized remediation roadmap.

Data Loss Prevention for AI Workloads

Enforce policies that prevent sensitive data from being submitted to or processed by AI agent endpoints without authorization. Cyera's DLP capabilities extend to agentic pipelines and developer tooling, ensuring outputs cannot be silently exfiltrated.

Threat Detection & Incident Response

Detect anomalous access patterns and data movement consistent with agent-layer exploitation of vulnerabilities like Claw Chain. Cyera's threat intelligence helps security teams investigate potential past exposure and understand the blast radius of an agent compromise.

For the full technical breakdown go to: cyera.com/research

Share