LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-43530

CVE-2026-43530 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: May 5, 2026

OpenClaw - Authentication Bypass

Published: May 5, 2026Updated: May 5, 2026Remote Exploitable

Overview

OpenClaw 2026.2.23 < 2026.4.12 contains a broken authentication caused by weakened exec approval binding in busybox and toybox applet execution, letting attackers obscure applet execution and bypass exec approval, exploit requires crafted opaque multi-call binaries.

Severity & Score

Severity: High
CVSS Score: 8.8

Impact

Attackers can bypass exec approval mechanisms, obscuring applet execution and weakening risk classification, potentially leading to unauthorized command execution.

Mitigation

Upgrade to version 2026.4.12 or later.

Details

CVE ID
CVE-2026-43530
Severity
High
CVSS Score
8.8
Type
broken_authentication
Status
new

CWE

  • CWE-863

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H