CVE-2026-32898
MEDIUMOpenClaw < 2026.2.23 - ACP Permission Auto-Approval Bypass via Untrusted Tool Metadata
Title source: cnaDescription
OpenClaw versions prior to 2026.2.23 contain an authorization bypass vulnerability in the ACP client that auto-approves tool calls based on untrusted toolCall.kind metadata and permissive name heuristics. Attackers can bypass interactive approval prompts for read-class operations by spoofing tool metadata or using non-core read-like names to reach auto-approve paths.
Scores
CVSS v3
5.4
EPSS
0.0002
EPSS Percentile
5.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-807
Status
published
Products (4)
npm/openclaw
0 - 2026.2.23npm
OpenClaw/OpenClaw
< 2026.2.23
openclaw/openclaw
< 2026.2.23
OpenClaw/OpenClaw
2026.2.23
Published
Mar 21, 2026
Tracked Since
Mar 21, 2026