Claw Chain four crashes concatenated in OpenClaw that allow to climb privileges to steal secrets and plant back doors

Published 4 min de lectura 39 reading

Cybersecurity researchers have revealed a campaign of crashes focused on OpenClaw that, together, allow from information theft to the escalation of privileges and the installation of persistent back doors. Cyera called this set "Claw Chain": four vulnerabilities that, exploited in sequence, allow an attacker to enter the agent's sandbox, extract secrets, supplant the agent's owner and finally modify the configuration to stay within the environment.

The identified failures include two type-race conditions TOCTOU which can be written or read outside the planned assembly tree (CVE-2026-44112 and CVE-2026-44113), an incomplete validation of inputs that can be avoided by means of shell expansions in heirs (CVE-2026-44115) and a defective access control that trusts a customer-controlled header called senderIsOwner, which allows non-owner customers to scale their privileges (CVE-2026-44118). Each has a serious impact separately, but the real risk comes from the chain: malicious code achieves execution in the sandbox, extracts credentials and sensitive files, gets tokens from "owner" and finally plant mechanisms of persistence and backdoors.

Claw Chain four crashes concatenated in OpenClaw that allow to climb privileges to steal secrets and plant back doors
Image generated with IA.

That an opponent uses the agent itself to move within the environment makes the activity seem legitimate in the face of traditional controls: calls, file access and configuration changes benefit from the confidence already given to the agent, which Expands the damage radius and complicates detection. It is therefore essential to address both technical mediation and operational hygiene to reduce the exposure window and potential impact.

OpenClaw published corrections and mitigations in version 2026.4.22 after the responsible disclosure; the accredited discoverer is Vladimir Tokarev. To understand technically the categories of failure in play, it is appropriate to review public resources on career conditions and the validation of entries, for example the MITRE tab on TOCTOU and CWE-367 https: / / cwe.mitre.org / data / definitions / 367.html and Cyera's notes on the finding and classification of the threat https: / / www.cyera.com.

If you manage instances with OpenClaw, the immediate priority is to update to the parched version. In addition to updating, acts on several fronts: revoke and reissue credentials and tokens that may have been exposed, restrict the installation of plugins or external integrations until their integrity is verified, and apply segmentation controls to limit what resources the agents can reach. Check logs and telemetry in search of atypical behavior of the agent - mass readings of sensitive files, scriptures out of permitted routes or changes in programmed tasks - because the chain sought by the attacker imitates legitimate operations.

Claw Chain four crashes concatenated in OpenClaw that allow to climb privileges to steal secrets and plant back doors
Image generated with IA.

From the perspective of development and architecture, there are clear lessons: do not trust customer-controlled flags for authorization decisions; it derives the status of owner from authenticated tokens and server contexts, as those responsible have already corrected when issuing separate tokens for owner and non-owner. Avoid TOCTOU with atomic operations, file blocking or verifications that do not depend on unsafe time windows, and sanitize and restrict any shell expansion in complex inputs such as heirs.

For detection and response, it incorporates controls that not only look for signatures, but also abnormal patterns of behavior of the agent: sudden lifting of privileges, access to secrets outside the intended scope, or frequent changes in the runtime configuration. Complete with EDR / EDR-like, file integrity monitoring and least privileged policies in the agent's runtime. If you suspect commitment, you carry out a containment that includes isolating the agent, removing forensic devices and restoring them from good known images after the rotation of secrets.

Claw Chain is a reminder that management and automation agents are valuable objectives: they act with privileges and their normal behavior can hide a holding. It updates, audits and restricts, and considers this case as an example to strengthen the validation of inputs and the strict separation of tokens and responsibilities in any agent-based architecture.

Coverage

Related

More news on the same subject.