CVE-2026-42429
OpenClaw before 2026.4.8 contains a privilege escalation vulnerability in the gateway plugin HTTP authentication mechanism that widens identity-bearing operator.read requests into runtime operator.write permissions. Attackers can exploit this by sending read-scoped requests through the gateway auth route to gain unauthorized write access to runtime operations.
Ver en NVDAnálisis
This vulnerability in OpenClaw allows an attacker to escalate operator.read permissions to operator.write via a flaw in the gateway plugin authentication. Although the severity is high, OpenClaw is not a widely used infrastructure component or popular development tool within the community ecosystem.
Severidad
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:NCWE-863EPSS
Afecta
openclaw:openclawDescripción técnica
OpenClaw before 2026.4.8 contains a privilege escalation vulnerability in the gateway plugin HTTP authentication mechanism that widens identity-bearing operator.read requests into runtime operator.write permissions. Attackers can exploit this by sending read-scoped requests through the gateway auth route to gain unauthorized write access to runtime operations.