OpenClaw Improper Access Control Bypasses Denylist, Allows Persistent Malicious Configs
The National Vulnerability Database has detailed CVE-2026-45006, a high-severity improper access control vulnerability in OpenClaw before version 2026.4.23. This flaw, rated 8.8 CVSS, resides in the gateway tool’s config.apply and config.patch operations. It allows compromised models to write unsafe configuration changes by bypassing an incomplete denylist protection, a critical failure in security design.
Attackers leveraging this vulnerability can achieve persistence for malicious configuration modifications. These changes can affect command execution, network behavior, credentials, and even operator policies, and crucially, they survive system restarts. This isn’t just a transient exploit; it’s a deep architectural compromise that allows an attacker to rewrite the rules of the system.
This vulnerability highlights the inherent risks in overly permissive configuration interfaces, particularly when denylists are the primary control. Defenders must recognize that an incomplete denylist is no defense at all. The attacker’s calculus here is clear: once a model is compromised, they gain a lasting foothold, effectively owning critical system behavior and data.
What This Means For You
- If your organization utilizes OpenClaw, you must immediately patch to version 2026.4.23 or newer. Prioritize auditing configurations related to command execution, network policies, and credential management for any unauthorized or suspicious changes that may have been introduced via CVE-2026-45006. Assume compromise if you haven't patched.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-45006 - OpenClaw config.apply Unsafe Configuration Write
title: CVE-2026-45006 - OpenClaw config.apply Unsafe Configuration Write
id: scw-2026-05-11-ai-1
status: experimental
level: critical
description: |
Detects the specific config.apply operation in OpenClaw which is vulnerable to improper access control, allowing attackers to bypass denylist protections and write unsafe configuration changes. This rule specifically targets the vulnerable API endpoint and HTTP method used in exploitation.
author: SCW Feed Engine (AI-generated)
date: 2026-05-11
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-45006/
tags:
- attack.persistence
- attack.t1547.001
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/config.apply'
cs-method|exact:
- 'POST'
sc-status|exact:
- '200'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-45006 | Auth Bypass | OpenClaw gateway tool config.apply operation |
| CVE-2026-45006 | Auth Bypass | OpenClaw gateway tool config.patch operation |
| CVE-2026-45006 | Misconfiguration | OpenClaw before 2026.4.23 |
| CVE-2026-45006 | Improper Access Control | OpenClaw gateway tool incomplete denylist protection bypass |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 11, 2026 at 21:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.