OpenClaw Vulnerabilities Allow Code Execution and Privilege Escalation
Summary
CERT-Bund has issued a security advisory (WID-SEC-2026-0727) regarding critical vulnerabilities in OpenClaw, a personal AI assistant. The vulnerabilities, with a CVSS Base Score of 9.9, allow for code execution, privilege escalation, data manipulation, and denial-of-service attacks.
What changed
CERT-Bund has released a critical security advisory (WID-SEC-2026-0727) detailing multiple severe vulnerabilities in OpenClaw, a personal AI assistant software. The vulnerabilities, rated with a CVSS Base Score of 9.9, can be exploited by attackers to achieve arbitrary code execution, gain administrator privileges, manipulate data, bypass security measures, disclose confidential information, and cause denial-of-service conditions. The affected product is Open Source OpenClaw version prior to 2026.3.13.
Users of OpenClaw are strongly advised to update to a patched version or apply available mitigations immediately to prevent exploitation. Failure to address these vulnerabilities could lead to significant security breaches, including complete system compromise. The advisory highlights the urgent need for users to assess their exposure and implement necessary security controls to protect their devices and data.
What to do next
- Update OpenClaw to version 2026.3.13 or later.
- Apply available mitigations if immediate update is not possible.
- Review system logs for signs of compromise.
Source document (simplified)
[WID-SEC-2026-0727] OpenClaw: Mehrere Schwachstellen CVSS Base Score 9.9 (kritisch) CVSS Temporal Score 8.6 (hoch) Remoteangriff ja Datum 15.03.2026 Stand 16.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
- UNIX
Produktbeschreibung
OpenClaw ist ein persönlicher KI-Assistent zur Ausführung auf eigenen Geräten.
Produkte
15.03.2026
- Open Source OpenClaw <2026.3.13
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in OpenClaw ausnutzen, um beliebigen Code auszuführen, erweiterte Berechtigungen – sogar Administratorrechte – zu erlangen, Daten zu manipulieren, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen oder andere, nicht näher spezifizierte Angriffe durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.