CVE-2026-41379
OpenClaw before 2026.3.28 contains a privilege escalation vulnerability allowing authenticated operators with write permissions to access admin-class Talk Voice configuration persistence. Attackers with operator.write privileges can exploit the chat.send endpoint to reach and modify sensitive voice configuration settings intended for administrators only.
View on NVDAnalysis
OpenClaw is a niche open-source engine recreation project, not a standard component of the MexicoDev professional stack. The vulnerability is a privilege escalation that requires the attacker to already possess operator-level write permissions, further narrowing the risk to specific internal configurations.
Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:NCWE-863EPSS
Affects
openclaw:openclawTechnical description
OpenClaw before 2026.3.28 contains a privilege escalation vulnerability allowing authenticated operators with write permissions to access admin-class Talk Voice configuration persistence. Attackers with operator.write privileges can exploit the chat.send endpoint to reach and modify sensitive voice configuration settings intended for administrators only.