Skip to content
CVSS 7.3 · HIGH

CVE-2026-41342

OpenClaw before 2026.3.28 contains an authentication bypass vulnerability in the remote onboarding component that persists unauthenticated discovery endpoints without explicit trust confirmation. Attackers can spoof discovery endpoints to redirect onboarding toward malicious gateways and capture gateway credentials or traffic.

View on NVD

Analysis

OpenClaw is not a standard tool in the common web, mobile, or infrastructure stacks used by this community. While the vulnerability allows for authentication bypass and credential theft, the product's low adoption rate does not justify an alert for the general developer population.

Severity

Score: 7.3(HIGH)
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
AV: ADJACENT_NETWORK
AC: LOW
PR: NONE
UI: REQUIRED
S: UNCHANGED
C: HIGH
I: HIGH
A: NONE
Weakness (CWE): CWE-346

EPSS

Probability of exploitation (next 30 days): 0.0001 (0.0%)
Percentile: 1.2%
EPSS: 2026-05-06

Affects

openclaw:openclaw

Technical description

OpenClaw before 2026.3.28 contains an authentication bypass vulnerability in the remote onboarding component that persists unauthenticated discovery endpoints without explicit trust confirmation. Attackers can spoof discovery endpoints to redirect onboarding toward malicious gateways and capture gateway credentials or traffic.

Published: 4/23/2026, 10:16:40 PM
Last modified: 4/29/2026, 3:55:12 PM

References

HomeEventsBlogResourcesTeam