Changeflow GovPing Data Privacy & Cybersecurity OpenClaw Vulnerabilities Allow Code Execution a...
Urgent Notice Added Final

OpenClaw Vulnerabilities Allow Code Execution and Privilege Escalation

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 15th, 2026
Detected March 16th, 2026
Email

Summary

CERT-Bund has issued a security advisory (WID-SEC-2026-0727) regarding critical vulnerabilities in OpenClaw, a personal AI assistant. The vulnerabilities, with a CVSS Base Score of 9.9, allow for code execution, privilege escalation, data manipulation, and denial-of-service attacks.

What changed

CERT-Bund has released a critical security advisory (WID-SEC-2026-0727) detailing multiple severe vulnerabilities in OpenClaw, a personal AI assistant software. The vulnerabilities, rated with a CVSS Base Score of 9.9, can be exploited by attackers to achieve arbitrary code execution, gain administrator privileges, manipulate data, bypass security measures, disclose confidential information, and cause denial-of-service conditions. The affected product is Open Source OpenClaw version prior to 2026.3.13.

Users of OpenClaw are strongly advised to update to a patched version or apply available mitigations immediately to prevent exploitation. Failure to address these vulnerabilities could lead to significant security breaches, including complete system compromise. The advisory highlights the urgent need for users to assess their exposure and implement necessary security controls to protect their devices and data.

What to do next

  1. Update OpenClaw to version 2026.3.13 or later.
  2. Apply available mitigations if immediate update is not possible.
  3. Review system logs for signs of compromise.

Source document (simplified)

[WID-SEC-2026-0727] OpenClaw: Mehrere Schwachstellen CVSS Base Score 9.9 (kritisch) CVSS Temporal Score 8.6 (hoch) Remoteangriff ja Datum 15.03.2026 Stand 16.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Sonstiges
  • UNIX

Produktbeschreibung

OpenClaw ist ein persönlicher KI-Assistent zur Ausführung auf eigenen Geräten.

Produkte

15.03.2026
- Open Source OpenClaw <2026.3.13

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in OpenClaw ausnutzen, um beliebigen Code auszuführen, erweiterte Berechtigungen – sogar Administratorrechte – zu erlangen, Daten zu manipulieren, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen oder andere, nicht näher spezifizierte Angriffe durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 15th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Geographic scope
Germany

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Vulnerabilities AI Assistants

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.