Cyera — Four Chainable OpenClaw CVEs Expose 180K+ AI Agent Servers
AI relevance: Autonomous AI agents are increasingly deployed with broad access to internal systems and credentials — Cyera's "Claw Chain" research shows how four chainable flaws in OpenClaw let an attacker use the agent itself to escalate from a sandbox foothold to full host control.
What happened
Cyera's research team disclosed four previously unknown vulnerabilities in OpenClaw, one of the most widely deployed open-source platforms for autonomous AI agents. All four were responsibly disclosed to maintainers in April 2026 and have since been patched.
- CVE-2026-44112 (CVSS 9.6 — Critical): TOCTOU filesystem write escape in the OpenShell sandbox. A race condition lets attackers redirect writes outside the sandbox boundary, enabling configuration tampering and persistent backdoor placement on the host.
- CVE-2026-44115 (CVSS 8.8 — High): Execution allowlist gap. Environment variables including API keys and credentials leak through unquoted heredocs that appear safe at validation time but expand at shell execution.
- CVE-2026-44118 (CVSS 7.8 — High): MCP loopback privilege escalation. OpenClaw trusts a client-controlled
senderIsOwnerflag without validating it against the authenticated session, letting a local process elevate to owner-level privileges and control gateway configuration, cron scheduling, and execution environments. - CVE-2026-44113 (CVSS 7.7 — High): TOCTOU filesystem read escape. The same race-condition pattern in read operations lets attackers swap a validated file path with a symbolic link pointing outside the allowed mount root, exposing system files and credentials.
The attack chain
The individual vulnerabilities are serious, but the combined effect is the critical finding. From a single foothold — a malicious plugin, prompt injection, or compromised external input — an attacker can chain three of the flaws in parallel:
- Foothold: Malicious code executes inside the OpenShell sandbox.
- Data exfiltration: TOCTOU read escape (CVE-2026-44113) and env-var disclosure (CVE-2026-44115) expose credentials and sensitive files beyond the agent's intended scope.
- Privilege escalation: MCP loopback flaw (CVE-2026-44118) elevates the process to owner-level control of the agent runtime.
- Persistence: TOCTOU write escape (CVE-2026-44112) plants backdoors and alters agent behavior.
Why it matters
- Shodan and Zoomeye scans identified ~65K and ~180K publicly accessible OpenClaw servers respectively — ~245K total exposed instances as of May 2026.
- Each step in the chain looks like normal agent behavior to traditional controls, making detection significantly harder.
- OpenClaw agents typically operate with broad access to internal systems, SaaS data, and credentials — often with weaker governance than the systems they connect to.
- The
senderIsOwnerdesign flaw demonstrates a broader pattern: AI agent platforms that trust client-provided identity signals without server-side validation create trivial privilege escalation paths.
What to do
- Update OpenClaw to the latest patched version (post-April 23, 2026 patches).
- Audit publicly exposed instances and restrict network access to trusted ranges.
- Review agent permission scopes — apply the principle of least privilege to agent tool access.
- Monitor for anomalous agent behavior: unexpected file writes outside sandbox boundaries, environment variable access patterns, or unauthorized configuration changes.