The Whisper Game: Agent-to-Agent Privilege Escalation in OpenClaw
Vulnerability ID: GHSA-W5C7-9QQW-6645
CVSS Score: 8.6
Published: 2026-02-18
A critical flaw in OpenClaw's orchestration engine allowed low-privilege AI agents to masquerade as the human user when communicating with high-privilege agents. By failing to track instruction provenance, the system treated internal 'inter-session' messages as direct user commands, enabling a classic confused deputy attack where a compromised sub-agent could coerce the admin agent into executing arbitrary code.
TL;DR
OpenClaw agents could talk to each other, but the system forgot to check who was talking. A compromised 'Email Reader' agent could send a message to the 'System Admin' agent via the sessions_send tool. The Admin agent would see this message as coming directly from the User (God Mode) and happily execute commands like rm -rf /, bypassing all authorization checks.
⚠️ Exploit Status: POC
Technical Details
- Vulnerability Type: Instruction Provenance Confusion
- Attack Vector: Indirect Prompt Injection
- CVSS Score (Est): 8.6 (High)
- Affected Component: sessions_send tool / Transcript Storage
- Patched Version: v2026.2.12
- Exploit Maturity: PoC / Conceptual
Affected Systems
- OpenClaw AI Orchestrator
- Multi-Agent Systems using
sessions_sendtool -
OpenClaw: < v2026.2.12 (Fixed in:
v2026.2.12)
Code Analysis
Commit: 85409e4
Fix: introduce input provenance and sanitize inter-session messages
+ export type InputProvenance = { kind: "inter_session" ... }
- messages.push({ role: "user", content: ... })
Exploit Details
- GitHub Advisory: Conceptual PoC demonstrating privilege escalation via sessions_send
Mitigation Strategies
- Update to OpenClaw v2026.2.12 immediately to enforce provenance tracking.
- Disable the
sessions_sendtool for agents that process untrusted external input (web, email). - Implement
human_approval: truefor sensitive tools likeexec_bashorwrite_file. - Review system prompts to explicitly instruct agents to treat
[Inter-session message]content with skepticism.
Remediation Steps:
- Pull the latest docker image or git repository for OpenClaw.
- Verify that
src/sessions/input-provenance.tsexists in your source tree. - Restart the agent orchestration service.
- Audit existing
.jsonlsession logs for historical anomalies whererole: 'user'messages appear without provenance metadata.
References
Read the full report for GHSA-W5C7-9QQW-6645 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)