CVE-2026-41342
OpenClaw before 2026.3.28 contains an authentication bypass vulnerability in the remote onboarding component that persists unauthenticated discovery endpoints without explicit trust confirmation. Attackers can spoof discovery endpoints to redirect onboarding toward malicious gateways and capture gateway credentials or traffic.
View on NVDAnalysis
OpenClaw is not a standard tool in the common web, mobile, or infrastructure stacks used by this community. While the vulnerability allows for authentication bypass and credential theft, the product's low adoption rate does not justify an alert for the general developer population.
Severity
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:NCWE-346EPSS
Affects
openclaw:openclawTechnical description
OpenClaw before 2026.3.28 contains an authentication bypass vulnerability in the remote onboarding component that persists unauthenticated discovery endpoints without explicit trust confirmation. Attackers can spoof discovery endpoints to redirect onboarding toward malicious gateways and capture gateway credentials or traffic.