SB2026040840 - Multiple vulnerabilities in OpenClaw
Published: April 8, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2026-33574)
The vulnerability allows a local user to write files outside the intended tools directory.
The vulnerability exists due to a time-of-check time-of-use race condition in the skills download installer when downloading and copying the archive into place after validating the per-skill tools root path. A local user can rebind the tools-root path between validation and the final write to write files outside the intended tools directory.
2) Authentication Bypass by Alternate Name (CVE-ID: CVE-2026-34506)
The vulnerability allows a remote user to bypass sender authorization checks.
The vulnerability exists due to improper access control in the Microsoft Teams plugin message handler when processing messages for a route with a configured team/channel allowlist and an empty groupAllowFrom setting. A remote user can send messages from an unauthorized sender within the matched team/channel to bypass sender authorization checks.
This issue only arises when groupPolicy is set to "allowlist", a route allowlist is configured, and the sender allowlist is empty.
3) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2026-32921)
The vulnerability allows a remote user to bypass approved script content constraints and execute unintended code.
The vulnerability exists due to a time-of-check time-of-use race condition in the system.run approval flow when processing interpreter-style script operands across approval and execution. A remote user can obtain approval for a command, modify the approved script before execution, and then execute different content under the previously approved command shape to bypass approved script content constraints and execute unintended code.
The issue affects mutable script operands where the approved argv values remain unchanged while the on-disk script content drifts after approval.
Remediation
Install update from vendor's website.