CVE-2026-32898

MEDIUM

OpenClaw < 2026.2.23 - ACP Permission Auto-Approval Bypass via Untrusted Tool Metadata

Title source: cna
STIX 2.1

Description

OpenClaw versions prior to 2026.2.23 contain an authorization bypass vulnerability in the ACP client that auto-approves tool calls based on untrusted toolCall.kind metadata and permissive name heuristics. Attackers can bypass interactive approval prompts for read-class operations by spoofing tool metadata or using non-core read-like names to reach auto-approve paths.

Scores

CVSS v3 5.4
EPSS 0.0002
EPSS Percentile 5.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-807
Status published
Products (4)
npm/openclaw 0 - 2026.2.23npm
OpenClaw/OpenClaw < 2026.2.23
openclaw/openclaw < 2026.2.23
OpenClaw/OpenClaw 2026.2.23
Published Mar 21, 2026
Tracked Since Mar 21, 2026