No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9f4w-67g7-mqwv | OpenClaw: Endpoint persists after trust decline, leaking gateway credentials |
Tue, 21 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.31 contains a trust-decline vulnerability that preserves attacker-discovered endpoints in remote onboarding flows. Attackers can route gateway credentials to malicious endpoints by having their discovered URL survive the trust decline process into manual prompts requiring operator acceptance. | |
| Title | OpenClaw < 2026.3.31 - Attacker-Discovered Endpoint Preservation in Remote Onboarding | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-372 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-21T13:03:24.309Z
Reserved: 2026-04-20T14:01:13.151Z
Link: CVE-2026-41300
Updated: 2026-04-21T13:03:03.147Z
Status : Received
Published: 2026-04-21T00:16:30.690
Modified: 2026-04-21T00:16:30.690
Link: CVE-2026-41300
No data.
OpenCVE Enrichment
Updated: 2026-04-21T01:00:12Z
Github GHSA