Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 30 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 29 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in the gateway agent RPC that allows authenticated operators with operator.write permission to override workspace boundaries by supplying attacker-controlled spawnedBy and workspaceDir values. Remote operators can escape the configured workspace boundary and execute arbitrary file and exec operations from any process-accessible directory. | |
| Title | OpenClaw < 2026.3.11 - Workspace Boundary Bypass via Agent RPC Parameters | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-668 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-30T11:37:10.947Z
Reserved: 2026-03-23T11:00:48.408Z
Link: CVE-2026-33573
Updated: 2026-03-30T11:27:47.930Z
Status : Analyzed
Published: 2026-03-29T13:17:02.980
Modified: 2026-03-30T15:51:37.330
Link: CVE-2026-33573
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:58:12Z