OpenClaw Vulnerabilities
Summary
CERT-Bund has issued a security advisory for OpenClaw, detailing multiple critical vulnerabilities with a CVSS score of 9.9. These vulnerabilities allow for remote code execution, privilege escalation, data manipulation, and denial-of-service attacks. A mitigation is available.
What changed
CERT-Bund has released a critical security advisory (WID-SEC-2026-0856) concerning multiple vulnerabilities in OpenClaw, a personal AI assistant software. The vulnerabilities carry a CVSS Base Score of 9.9 and a Temporal Score of 8.6, indicating a high risk. Exploitation allows remote attackers to execute arbitrary code, gain administrator privileges, manipulate data, bypass security measures, disclose confidential information, or cause denial-of-service conditions.
Users of OpenClaw, particularly those running versions prior to 2026.3.22 on Linux or UNIX operating systems, are strongly advised to apply the available mitigation. Failure to do so could result in severe security breaches, including complete system compromise. The advisory indicates that a mitigation is available, and users should consult the provided links for specific instructions and version history.
What to do next
- Apply available mitigation for OpenClaw
- Update OpenClaw to version 2026.3.22 or later
- Review system security for Linux and UNIX environments running OpenClaw
Source document (simplified)
[WID-SEC-2026-0856] OpenClaw: Mehrere Schwachstellen CVSS Base Score 9.9 (kritisch) CVSS Temporal Score 8.6 (hoch) Remoteangriff ja Datum 24.03.2026 Stand 25.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- UNIX
Produktbeschreibung
OpenClaw ist ein persönlicher KI-Assistent zur Ausführung auf eigenen Geräten.
Produkte
24.03.2026
- Open Source OpenClaw <2026.3.22
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in OpenClaw ausnutzen, um beliebigen Code auszuführen, erweiterte Berechtigungen – sogar Administratorrechte – zu erlangen, Daten zu manipulieren, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen oder andere, nicht näher spezifizierte Angriffe durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.