Connect Clawsmith to your coding agent. Ship products like crazy.Unlimited usage during betaGet API Key โ†’
โ† Back to dashboard
clawsmith.com/signal/openclaw-april-cve-batch-priv-esc-path-traversal-hn
โš  IssueWide OpenSecurityLive

OpenClaw April CVE Batch: 6 HIGH-Severity Privilege Escalation and Path Traversal CVEs Spark 514-Point HN Discussion

Between April 9-10, 2026, 6 new HIGH-severity CVEs (CVE-2026-35625, 35629, 35637, 35638, 35668, 35669) were disclosed for OpenClaw versions before 2026.3.25, covering privilege escalation via scope boundary bypass, sandbox path traversal allowing cross-agent file reads, and SSRF in channel extensions. The HN discussion hit 514 points and 256 comments with debate over 135K+ publicly exposed instances.

Product Idea from this Signal

A reverse proxy that enforces scope boundaries on OpenClaw gateway plugin routes and normalizes sandbox file paths before forwarding

770 โ–ฒ

OpenClaw's gateway plugin HTTP routes have a class of vulnerabilities where authenticated callers can escalate to operator.admin scope regardless of their actual permissions (CVE-2026-35669, CVSS 8.8), and sandboxed agents can read arbitrary files across workspaces through unnormalized path parameters (CVE-2026-35668). With 135K+ OpenClaw instances publicly exposed and six new HIGH-severity CVEs disclosed in April 2026 alone, a standalone reverse proxy that sits in front of the gateway and validates every plugin route call against the caller's granted scopes, while normalizing all file path parameters including mediaUrl and fileUrl aliases, would close these attack vectors without waiting for upstream patches.

SECURITYPROXYOPEN-SOURCEDEVTOOL
CompetitiveView Opportunity โ†’

Score Breakdown

HN
770

Frequently Asked Questions