‘Claw Chain’ OpenClaw Flaws Allow Sandbox Escape, Backdoor Delivery

https://www.securityweek.com/wp-content/uploads/2026/02/OpenClaw.jpeg

Four vulnerabilities in the OpenClaw AI assistant can be chained together to plant backdoors on the underlying host, cybersecurity firm Cyera warns.

The bugs, collectively known as Claw Chain, allow an attacker with code execution privileges inside the sandbox to control the agent runtime and abuse it to compromise the system.

According to Cyera, the attacker can rely on prompt injections, malicious plugins, and compromised external input to trigger the attack chain and turn the AI into their own assistant.

After gaining code execution within the OpenShell sandbox, the attacker can exploit a race condition (CVE-2026-44113) to read files outside the mount root, or an exec allowlist analysis bug (CVE-2026-44115) to execute unapproved commands at runtime.

Successful exploitation of these issues, Cyera notes, allows the attacker to bypass sandbox restrictions and leak credentials, API keys, tokens, configuration files, and other sensitive data.

Next, the attacker can exploit an MCP...

Copyright of this story solely belongs to securityweek.com. To see the full text click HERE

Read more