Skip to content
CVSS 7.1 · HIGH

CVE-2026-41379

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability allowing authenticated operators with write permissions to access admin-class Talk Voice configuration persistence. Attackers with operator.write privileges can exploit the chat.send endpoint to reach and modify sensitive voice configuration settings intended for administrators only.

View on NVD

Analysis

OpenClaw is a niche open-source engine recreation project, not a standard component of the MexicoDev professional stack. The vulnerability is a privilege escalation that requires the attacker to already possess operator-level write permissions, further narrowing the risk to specific internal configurations.

Severity

Score: 7.1(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: LOW
I: HIGH
A: NONE
Weakness (CWE): CWE-863

EPSS

Probability of exploitation (next 30 days): 0.0002 (0.0%)
Percentile: 6.7%
EPSS: 2026-05-06

Affects

openclaw:openclaw

Technical description

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability allowing authenticated operators with write permissions to access admin-class Talk Voice configuration persistence. Attackers with operator.write privileges can exploit the chat.send endpoint to reach and modify sensitive voice configuration settings intended for administrators only.

Published: 4/28/2026, 7:37:40 PM
Last modified: 5/1/2026, 3:51:25 PM

References

HomeEventsBlogResourcesTeam