#VU125133 Improper access control in OpenClaw - CVE-2026-27646
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to initialize host-side ACP sessions.
The vulnerability exists due to improper access control in the /acp spawn command handler when handling sandboxed /acp spawn requests. A remote user can send a /acp spawn command to initialize host-side ACP sessions.
Exploitation requires an already authorized sender in a sandboxed session, and ACP must be enabled with a backend available.