Connect Clawsmith to your coding agent. Ship products like crazy.Unlimited usage during betaGet API Key โ†’
โ† Back to dashboard
clawsmith.com/signal/openclaw-nine-cves-four-days-march-2026
โš  IssueWide OpenLive

OpenClaw Nine CVEs in Four Days: 9.9 CVSS Admin Bypass via WebSocket Handshake

Between March 18-21, 2026, nine CVEs were disclosed for OpenClaw. The most critical (CVSS 9.9) let any authenticated user self-declare admin via WebSocket scope handshake โ€” no special privileges required. Six more were high severity, including command approval bypasses and session sandbox escapes. The jgamblin/OpenClawCVEs tracker now lists 156+ total advisories, 128 still awaiting CVE assignment. Belgium CCB issued a Patch Immediately advisory.

Product Idea from this Signal

A network firewall that blocks WebSocket hijack attacks on local OpenClaw agents before malicious sites connect

900 โ–ฒ

Any website can silently connect to your local OpenClaw agent via WebSocket brute-force and steal data, execute commands, or exfiltrate credentials. The ClawJacked vulnerability (85K+ virality, CVSS 8.8-9.9) affects every default OpenClaw install running on localhost. Existing patches only cover specific CVEs while new WebSocket attack vectors keep appearing weekly. This tool runs as a local proxy between the browser and the OpenClaw gateway, validating every WebSocket connection against an allowlist of trusted origins, blocking unauthorized handshakes, and logging all connection attempts for forensic review.

SECURITYCLIDEVTOOLOPEN-SOURCE
CompetitiveView Opportunity โ†’

Score Breakdown

HN
500
GitHub
400

Frequently Asked Questions