Connect Clawsmith to your coding agent. Ship products like crazy.Unlimited usage during betaGet API Key โ†’
โ† Back to dashboard
clawsmith.com/signal/openclaw-april-cve-batch-priv-esc-path-traversal-hn
โš  IssueWide OpenSecurityLive

OpenClaw April CVE Batch Expands: 13+ HIGH-Severity CVEs Including Privilege Escalation, Path Traversal, SSRF

April 2026 OpenClaw CVE batch grows to 13+ vulnerabilities including CVE-2026-35669 (CVSS 8.8 gateway plugin priv-esc), CVE-2026-35625 (silent auth reconnect priv-esc to RCE), CVE-2026-35660 (/reset access control bypass), CVE-2026-35629 (SSRF in channel extensions), CVE-2026-35668 (sandbox path traversal). All fixed in v2026.3.25.

Product Idea from this Signal

A reverse proxy that enforces scope boundaries on OpenClaw gateway plugin routes and normalizes sandbox file paths before forwarding

770 โ–ฒ

OpenClaw's gateway plugin HTTP routes have a class of vulnerabilities where authenticated callers can escalate to operator.admin scope regardless of their actual permissions (CVE-2026-35669, CVSS 8.8), and sandboxed agents can read arbitrary files across workspaces through unnormalized path parameters (CVE-2026-35668). With 135K+ OpenClaw instances publicly exposed and six new HIGH-severity CVEs disclosed in April 2026 alone, a standalone reverse proxy that sits in front of the gateway and validates every plugin route call against the caller's granted scopes, while normalizing all file path parameters including mediaUrl and fileUrl aliases, would close these attack vectors without waiting for upstream patches.

SECURITYPROXYOPEN-SOURCEDEVTOOL
CompetitiveView Opportunity โ†’

Score Breakdown

HN
770

Frequently Asked Questions