Claw Chain: Cyera research unveils four chainable vulnerabilities in OpenClaw
Cyera Research blog post disclosing "Claw Chain" — four chainable vulnerabilities in OpenClaw (all versions prior to April 23, 2026 patches). Published May 15, 2026 by Cyera Research. Covers four CVEs, attack chain, affected surface, and recommended mitigations.
Date
May 15, 2026
First Seen
May 15, 2026
Last Reviewed
May 18, 2026
Publisher
Cyera
Source Type
article
Related reading
OpenClaw Security GuideA practical baseline for local binding, scoped credentials, sandboxing, runtime checks, and Armorer Guard.
Securing OpenClaw with Armorer GuardHow Armorer wraps OpenClaw with managed setup, Docker hardening, health checks, approvals, and Guard-backed scanning.
Source Summary
What It Contains
Cyera Research blog post disclosing "Claw Chain" — four chainable vulnerabilities in OpenClaw (all versions prior to April 23, 2026 patches). Published May 15, 2026 by Cyera Research. Covers four CVEs, attack chain, affected surface, and recommended mitigations.
Extracted Claims
-
Four CVEs:
- CVE-2026-44112 — TOCTOU Filesystem Write Escape — CRITICAL 9.6
- CVE-2026-44115 — Execution Allowlist Env-Vars Disclosure — HIGH 8.8
- CVE-2026-44118 — MCP Loopback Privilege Escalation — HIGH 7.8
- CVE-2026-44113 — TOCTOU Filesystem Read Escape — HIGH 7.7
-
Attack chain:
- Foothold via malicious plugin, prompt injection, or compromised supply-chain input (code execution inside OpenShell sandbox)
- Data exfiltration via CVE-2026-44113 (TOCTOU read escape) + CVE-2026-44115 (env-var disclosure)
- Privilege escalation via CVE-2026-44118 (MCP loopback flaw → owner-level control of agent runtime)
- Persistence via CVE-2026-44112 (TOCTOU write escape → backdoors, config modification)
-
Affected product: OpenClaw, all versions prior to April 23, 2026 patches
-
Public exposure: ~65,000 (Shodan) to ~180,000 (Zoomeye) internet-facing OpenClaw servers
-
GHSA references: GHSA-5h3g-6xhh-rg6p, GHSA-wppj-c6mr-83jj, GHSA-r6xh-pqhr-v4xh, GHSA-x3h8-jrgh-p8jx
-
OpenClaw history: Originally launched as "Clawdbot" in late 2025
MITRE ATT&CK (inferred)
- T1068 — Exploitation for Privilege Escalation (MCP loopback)
- T1059 — Command and Scripting Interpreter (env-var disclosure)
- T1552 — Unsecured Credentials (env-var exposure)
- T1574 — Hijack Execution Flow (TOCTOU write for persistence)
Evidence Quality
Primary vendor security research disclosure with four assigned CVEs, specific severity scores, and a defined attack chain. High confidence.
Follow-Up
- Update once official CVE listings and patch versions are confirmed via NVD or OpenClaw release notes
- Cross-reference with any related Oasis Security findings on OpenClaw
- Update the newsfeed entry for ClawJacked with this new finding as it represents a related but distinct vulnerability chain