Skip to content
CVSS 8.1 · HIGH

CVE-2026-41353

OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile mutation and runtime profile selection. Remote attackers can exploit this by manipulating browser proxy profiles at runtime to access restricted profiles and bypass intended access controls.

Ver en NVD

Análisis

OpenClaw is a niche re-implementation or utility tool not commonly found in professional development or server stacks. While the vulnerability allows for an access control bypass, it does not impact widely used infrastructure or popular development frameworks.

Severidad

Puntaje: 8.1(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: NONE
Tipo de falla (CWE): CWE-472

EPSS

Probabilidad de explotación (próx. 30 días): 0.0005 (0.0%)
Percentil: 14.2%
EPSS: 2026-05-06

Afecta

openclaw:openclaw

Descripción técnica

OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile mutation and runtime profile selection. Remote attackers can exploit this by manipulating browser proxy profiles at runtime to access restricted profiles and bypass intended access controls.

Publicada: 23/4/2026, 22:16:42
Última modificación: 1/5/2026, 20:14:12

Referencias

InicioEventosBlogRecursosEquipo