Skip to content
CVSS 8.1 · HIGH

CVE-2026-41353

OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile mutation and runtime profile selection. Remote attackers can exploit this by manipulating browser proxy profiles at runtime to access restricted profiles and bypass intended access controls.

View on NVD

Analysis

OpenClaw is a niche re-implementation or utility tool not commonly found in professional development or server stacks. While the vulnerability allows for an access control bypass, it does not impact widely used infrastructure or popular development frameworks.

Severity

Score: 8.1(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: NONE
Weakness (CWE): CWE-472

EPSS

Probability of exploitation (next 30 days): 0.0005 (0.0%)
Percentile: 14.2%
EPSS: 2026-05-06

Affects

openclaw:openclaw

Technical description

OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile mutation and runtime profile selection. Remote attackers can exploit this by manipulating browser proxy profiles at runtime to access restricted profiles and bypass intended access controls.

Published: 4/23/2026, 10:16:42 PM
Last modified: 5/1/2026, 8:14:12 PM

References

HomeEventsBlogResourcesTeam