CVE-2026-41342
OpenClaw before 2026.3.28 contains an authentication bypass vulnerability in the remote onboarding component that persists unauthenticated discovery endpoints without explicit trust confirmation. Attackers can spoof discovery endpoints to redirect onboarding toward malicious gateways and capture gateway credentials or traffic.
Ver en NVDAnálisis
OpenClaw is not a standard tool in the common web, mobile, or infrastructure stacks used by this community. While the vulnerability allows for authentication bypass and credential theft, the product's low adoption rate does not justify an alert for the general developer population.
Severidad
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:NCWE-346EPSS
Afecta
openclaw:openclawDescripción técnica
OpenClaw before 2026.3.28 contains an authentication bypass vulnerability in the remote onboarding component that persists unauthenticated discovery endpoints without explicit trust confirmation. Attackers can spoof discovery endpoints to redirect onboarding toward malicious gateways and capture gateway credentials or traffic.