Skip to content
CVSS 8.8 · HIGH

CVE-2026-43569

OpenClaw before 2026.4.9 contains an authentication bypass vulnerability allowing untrusted workspace plugins to be auto-enabled during non-interactive onboarding when provider auth choices are shadowed. Attackers can exploit this by crafting malicious workspace plugins that are automatically selected and enabled during authentication setup without explicit user consent.

View on NVD

Analysis

OpenClaw is a specialized tool with limited adoption in the general software development ecosystem. While the vulnerability allows for authentication bypass and the automatic enablement of untrusted plugins, the product's narrow usage does not warrant a high-priority alert for the broader community.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: REQUIRED
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-829

EPSS

Probability of exploitation (next 30 days): 0.0007 (0.1%)
Percentile: 20.5%
EPSS: 2026-05-06

Affects

openclaw:openclaw

Technical description

OpenClaw before 2026.4.9 contains an authentication bypass vulnerability allowing untrusted workspace plugins to be auto-enabled during non-interactive onboarding when provider auth choices are shadowed. Attackers can exploit this by crafting malicious workspace plugins that are automatically selected and enabled during authentication setup without explicit user consent.

Published: 5/5/2026, 12:16:20 PM
Last modified: 5/7/2026, 1:52:25 AM

References

HomeEventsBlogResourcesTeam