No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.23 contain an authorization bypass vulnerability in the ACP client that auto-approves tool calls based on untrusted toolCall.kind metadata and permissive name heuristics. Attackers can bypass interactive approval prompts for read-class operations by spoofing tool metadata or using non-core read-like names to reach auto-approve paths. | |
| Title | OpenClaw < 2026.2.23 - ACP Permission Auto-Approval Bypass via Untrusted Tool Metadata | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-807 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T17:26:26.267Z
Reserved: 2026-03-16T21:18:44.711Z
Link: CVE-2026-32898
Updated: 2026-03-23T17:26:22.497Z
Status : Analyzed
Published: 2026-03-21T01:17:10.870
Modified: 2026-03-24T21:07:15.300
Link: CVE-2026-32898
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:51:11Z