OpenClaw versions prior to 2026.2.23 contain an authorization bypass vulnerability in the ACP client that auto-approves tool calls based on untrusted toolCall.kind metadata and permissive name heuristics. Attackers can bypass interactive approval prompts for read-class operations by spoofing tool metadata or using non-core read-like names to reach auto-approve paths.
Cite this page
CVE-2026-32898. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2026-32898
Use CWE-807, Openclaw vendor hub and Openclaw product page to widen CVE-2026-32898 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-42426, CVE-2026-42423 and CVE-2026-42422 for nearby disclosures in the same product family.