CVE-2026-32898
Received Received - Intake
Authorization Bypass in OpenClaw ACP Client Enables Unauthorized Reads

Publication date: 2026-03-21

Last updated on: 2026-03-24

Assigner: VulnCheck

Description
OpenClaw versions prior to 2026.2.23 contain an authorization bypass vulnerability in the ACP client that auto-approves tool calls based on untrusted toolCall.kind metadata and permissive name heuristics. Attackers can bypass interactive approval prompts for read-class operations by spoofing tool metadata or using non-core read-like names to reach auto-approve paths.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-21
Last Modified
2026-03-24
Generated
2026-05-07
AI Q&A
2026-03-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.2.23 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-807 The product uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-32898 is an authorization bypass vulnerability in the OpenClaw ACP client versions prior to 2026.2.23. The vulnerability arises because the client auto-approves permission requests for read-class operations based on untrusted tool metadata (specifically the toolCall.kind field) and permissive heuristics on tool names. Attackers can exploit this by spoofing the tool metadata or using non-core read-like operation names to bypass interactive approval prompts, gaining unauthorized access to resources.

The root cause is that the ACP client trusted the server-provided toolCall.kind metadata and used lenient name matching to auto-approve permission requests without sufficient validation or scoping. This allowed malicious or compromised tools to gain unauthorized read permissions.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to files or data by bypassing the interactive approval prompts that are supposed to protect read-class operations. Attackers can exploit the auto-approval mechanism to perform read operations outside the intended scope, potentially accessing sensitive information without user consent.

Specifically, attackers can spoof tool metadata or use non-core read-like tool names to trick the ACP client into auto-approving permission requests, which may result in privilege escalation or unauthorized data disclosure.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring for unauthorized or suspicious ACP client permission auto-approval events, especially those that bypass interactive approval prompts for read-class operations.

Since the vulnerability exploits spoofed toolCall.kind metadata and permissive name heuristics, detection can focus on identifying tool calls with unusual or non-core tool names, spoofed metadata fields, or read operations accessing files outside the current working directory.

Commands or methods to detect this might include:

  • Enable and review ACP client debug or audit logs to identify permission requests that were auto-approved without explicit user prompts.
  • Search logs for tool calls with suspicious or non-standard tool names, especially those that mimic read-like operations but are not in the trusted core tool ID allowlist.
  • Monitor file access patterns for reads outside the expected current working directory scope.
  • Use system or network monitoring tools to detect unusual ACP client activity or permission grants.

Specific commands are not provided in the available resources, but enabling verbose or debug logging in the ACP client and analyzing those logs for anomalies related to toolCall.kind spoofing or out-of-scope file reads is recommended.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, upgrade the OpenClaw ACP client to version 2026.2.23 or later, where the issue has been fixed.

The fix includes:

  • Restricting auto-approval to a strict allowlist of trusted core tool IDs.
  • Scoping read permission auto-approval strictly to files within the current working directory.
  • Ignoring untrusted server-provided toolCall.kind metadata to prevent spoofing.
  • Enforcing strict validation of tool names to reject malformed or suspicious names.

If upgrading immediately is not possible, consider disabling or restricting the ACP client’s auto-approval feature, enabling interactive approval prompts for all permission requests, and monitoring for suspicious tool calls as a temporary mitigation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart