Execution with Unnecessary Privileges Affecting openclaw package, versions <2026.2.21


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-OPENCLAW-15372238
  • published4 Mar 2026
  • disclosed3 Mar 2026
  • creditRafael M

Introduced: 3 Mar 2026

New CVE NOT AVAILABLE CWE-250  (opens in a new tab)

How to fix?

Upgrade openclaw to version 2026.2.21 or higher.

Overview

openclaw is a 🦞 OpenClaw — Personal AI Assistant

Affected versions of this package are vulnerable to Execution with Unnecessary Privileges due to the absence of a USER directive in the Dockerfiles, causing all processes to run as root. An attacker can gain root privileges within the container by compromising any process running inside these containers, which may enable kernel exploit attempts, abuse of mounted volumes, and access to privileged syscalls.

References

CVSS Base Scores

version 4.0
version 3.1