CVE-2026-35643: OpenClaw Android RCE
CVE-2026-35643
OpenClaw before 2026.3.22 contains an unvalidated WebView JavascriptInterface vulnerability allowing attackers to inject arbitrary instructions. Untrusted pages can invoke the canvas bridge to execute...
Overview
A high-severity vulnerability, CVE-2026-35643, has been identified in the OpenClaw Android application. Versions prior to 2026.3.22 contain an unvalidated JavascriptInterface in a WebView component. This flaw allows a malicious webpage to invoke the application’s internal canvas bridge, leading to arbitrary code execution within the app’s context.
Technical Details
The vulnerability stems from improper security controls in the app’s WebView implementation. A JavascriptInterface named canvas is exposed to web content without proper validation. When a user navigates to an attacker-controlled webpage, that page can call this interface to inject and execute native instructions. The attack complexity is low, requiring no special privileges, but does require user interaction, such as clicking a link.
Impact
Successful exploitation grants an attacker the ability to execute code with the permissions of the vulnerable OpenClaw application. This could lead to data theft, unauthorized access to device features the app can use, or a foothold for further attacks on the device. The risk is significant for any user running an affected version of the app.
Remediation and Mitigation
The primary remediation is to update OpenClaw to version 2026.3.22 or later immediately. The vendor has addressed the flaw by implementing proper validation for the WebView bridge.
If an immediate update is not possible, consider these mitigations:
- Advise users to avoid clicking on untrusted links within the app or from external sources that may open the app.
- As a broader security measure, review and restrict the ability to sideload unverified applications on enterprise-managed devices to reduce the overall attack surface.
- Monitor network traffic for anomalies that may indicate attempted exploitation.
## Security Insight
This vulnerability highlights the persistent risk of insecure WebView configurations in mobile applications, a class of flaw often leading to severe impacts like those seen in ransomware exploiting zero-days. It underscores the critical need for developers to rigorously audit all bridges between web content and native code, similar to the data isolation principles violated in cross-tenant data leaks. The fix in version 2026.3.22 suggests the OpenClaw development lifecycle previously lacked sufficient security review for these high-risk components.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Postiz is an AI social media scheduling tool. Prior to version 2.21.6, a file upload validation bypass allows any authenticated user to upload arbitrary HTML, SVG, or other executable file types to th...
Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on magic-byte detection for content type, which do...
FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password change endpoint is vulnerable to NoSQL injection. An authenticated attacker can bypass the "old password" verifica...
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insuffici...