Skip to content
CVSS 8.2 · HIGH

CVE-2026-41394

OpenClaw before 2026.3.31 contains an authentication bypass vulnerability where unauthenticated plugin-auth HTTP routes receive operator runtime write scopes. Attackers can access these routes without authentication to perform privileged runtime actions intended for authorized operators.

View on NVD

Analysis

OpenClaw is an obscure open-source project with very low adoption in standard web or backend development stacks. Although the vulnerability allows unauthenticated administrative write access, the limited deployment scale makes it less relevant for a general community feed.

Severity

Score: 8.2(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: HIGH
A: NONE
Weakness (CWE): CWE-862

EPSS

Probability of exploitation (next 30 days): 0.0007 (0.1%)
Percentile: 20.8%
EPSS: 2026-05-06

Affects

openclaw:openclaw

Technical description

OpenClaw before 2026.3.31 contains an authentication bypass vulnerability where unauthenticated plugin-auth HTTP routes receive operator runtime write scopes. Attackers can access these routes without authentication to perform privileged runtime actions intended for authorized operators.

Published: 4/28/2026, 7:37:42 PM
Last modified: 4/30/2026, 8:45:14 PM

References

HomeEventsBlogResourcesTeam