Skip to content
CVSS 9.1 · CRITICAL

CVE-2026-41386

OpenClaw before 2026.3.22 contains a privilege escalation vulnerability where bootstrap setup codes are not bound to intended device roles and scopes during pairing. Attackers can exploit this during first-use device pairing to escalate privileges beyond their intended role and scope.

View on NVD

Analysis

OpenClaw is a niche project not widely used in professional web, mobile, or backend development. While the privilege escalation vulnerability is critical, it only impacts a specific device pairing process that is unlikely to affect the community's core infrastructure.

Severity

Score: 9.1(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: NONE
Weakness (CWE): CWE-648

EPSS

Probability of exploitation (next 30 days): 0.0004 (0.0%)
Percentile: 12.0%
EPSS: 2026-05-06

Affects

openclaw:openclaw

Technical description

OpenClaw before 2026.3.22 contains a privilege escalation vulnerability where bootstrap setup codes are not bound to intended device roles and scopes during pairing. Attackers can exploit this during first-use device pairing to escalate privileges beyond their intended role and scope.

Published: 4/28/2026, 7:37:41 PM
Last modified: 5/1/2026, 3:52:35 PM

References

HomeEventsBlogResourcesTeam