Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-43529— OpenClaw < 2026.4.10 - Time-of-Check-Time-of-Use (TOCTOU) Race Condition in exec Script Preflight Validator

CVSS 2.5 · Low EPSS 0.01% · P1
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-43529

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
OpenClaw < 2026.4.10 - Time-of-Check-Time-of-Use (TOCTOU) Race Condition in exec Script Preflight Validator
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenClaw before 2026.4.10 contains a time-of-check-time-of-use vulnerability in the validateScriptFileForShellBleed function that allows local attackers to bypass workspace boundary checks. An attacker with workspace write access can race-condition swap the target file between validation and preflight read, causing the validator to inspect a different file identity than the one that passed the initial boundary check.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
检查时间与使用时间(TOCTOU)的竞争条件
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenClaw 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenClaw是OpenClaw开源的一个智能人工助理。 OpenClaw 2026.4.10之前版本存在安全漏洞,该漏洞源于validateScriptFileForShellBleed函数中存在检查时间与使用时间问题,可能导致本地攻击者绕过工作区边界检查,通过竞争条件在验证和预检读取之间交换目标文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
OpenClawOpenClaw 0 ~ 2026.4.10 -

II. Public POCs for CVE-2026-43529

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-43529

登录查看更多情报信息。

Same Patch Batch · OpenClaw · 2026-05-05 · 26 CVEs total

CVE-2026-435669.1 CRITICALOpenClaw 2026.4.7 < 2026.4.14 - Privilege Escalation via Untrusted Webhook Wake Events
CVE-2026-435349.1 CRITICALOpenClaw < 2026.4.10 - Unsanitized External Input in Agent Hook Events
CVE-2026-424348.8 HIGHOpenClaw 2026.4.5 < 2026.4.10 - Sandbox Escape via host Parameter Override in Exec Routing
CVE-2026-435718.8 HIGHOpenClaw < 2026.4.10 - Untrusted Workspace Plugin Shadow Resolution in Channel Setup
CVE-2026-424358.8 HIGHOpenClaw 2026.2.22 < 2026.4.12 - Shell-Wrapper Detection Bypass via Environment Variable A
CVE-2026-435698.8 HIGHOpenClaw < 2026.4.9 - Untrusted Provider Plugin Auto-enablement via Workspace Provider Aut
CVE-2026-435308.8 HIGHOpenClaw 2026.2.23 < 2026.4.12 - Weakened Exec Approval Binding via busybox and toybox App
CVE-2026-435338.6 HIGHOpenClaw < 2026.4.10 - Arbitrary Local File Read via QQBot Media Tags
CVE-2026-424398.5 HIGHOpenClaw < 2026.4.10 - SSRF Policy Bypass in Browser Tabs Action Routes
CVE-2026-435268.2 HIGHOpenClaw < 2026.4.12 - Server-Side Request Forgery via QQBot Reply Media URL Handling
CVE-2026-435737.7 HIGHOpenClaw < 2026.4.10 - SSRF Policy Bypass in Existing-Session Browser Interaction Routes
CVE-2026-424367.7 HIGHOpenClaw < 2026.4.14 - Internal Page Content Exposure via Browser Snapshot and Screenshot
CVE-2026-424387.7 HIGHOpenClaw 2026.4.9 < 2026.4.10 - Sender Policy Bypass in Host Media Attachment Reads
CVE-2026-435277.7 HIGHOpenClaw < 2026.4.14 - Server-Side Request Forgery via Private Network Navigation
CVE-2026-435327.7 HIGHOpenClaw 2026.4.7 < 2026.4.10 - Sandbox Media Normalization Bypass via Discord Event Cover
CVE-2026-424377.5 HIGHOpenClaw 2026.4.9 < 2026.4.10 - Denial of Service via Oversized WebSocket Frames in Voice-
CVE-2026-435317.3 HIGHOpenClaw < 2026.4.9 - Environment Variable Injection via Workspace .env File
CVE-2026-435356.8 MEDIUMOpenClaw < 2026.4.14 - Authorization Context Reuse in Collect-Mode Queue Batches
CVE-2026-435286.5 MEDIUMOpenClaw < 2026.4.14 - Redaction Bypass via sourceConfig and runtimeConfig Aliases
CVE-2026-435676.5 MEDIUMOpenClaw < 2026.4.10 - Path Traversal in screen_record outPath Parameter

Showing top 20 of 26 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2026-43529

No comments yet


Leave a comment