Medium severity6.1NVD Advisory· Published Apr 10, 2026· Updated Apr 28, 2026
CVE-2026-35667
CVE-2026-35667
Description
OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-27486 where the !stop chat command uses an unpatched killProcessTree function from shell-utils.ts that sends SIGKILL immediately without graceful SIGTERM shutdown. Attackers can trigger process termination via the !stop command, causing data corruption, resource leaks, and skipped security-sensitive cleanup operations.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openclawnpm | < 2026.3.24 | 2026.3.24 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/openclaw/openclaw/security/advisories/GHSA-3298-56p6-rpw2nvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-3298-56p6-rpw2ghsaADVISORY
- github.com/advisories/GHSA-jfv4-h8mc-jcp8ghsaADVISORY
- www.vulncheck.com/advisories/openclaw-improper-process-termination-via-unpatched-killprocesstree-in-shell-utils-tsnvdThird Party Advisory
News mentions
0No linked articles in our index yet.