Description
OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile mutation and runtime profile selection. Remote attackers can exploit this by manipulating browser proxy profiles at runtime to access restricted profiles and bypass intended access controls.
Published: 2026-04-23
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Access Control Bypass
Action: Apply Patch
AI Analysis

Impact

OpenClaw prior to version 2026.3.22 contains an access control flaw in its allowProfiles feature that permits an attacker to skirt profile restrictions by mutating browser proxy profiles during runtime. The flaw enables unauthorized users to gain access to profiles intended to be protected, potentially exposing sensitive information or permitting further manipulation of application state. This weakness falls under CWE‑472, which denotes improper access control.

Affected Systems

The vulnerability affects installations of OpenClaw that are running any release before 2026.3.22. The issue is tied to the allowProfiles function, which is part of the core configuration of the OpenClaw server. Users operating older OpenClaw versions without the patch are therefore exposed to the risk of bypassing authorization controls.

Risk and Exploitability

The CVSS score of 7.6 indicates a high severity level, while the EPSS score of less than 1% suggests that the likelihood of real‑world exploitation is currently very low but not impossible. The vulnerability is not listed in the CISA KEV catalog, so no known large‑scale exploit activity has been reported. Attackers would need to convince a user to load malicious proxy profile data or otherwise gain control of the application’s profile handling logic; the description implies that the exploitation path requires remote interaction via the browser, so it is primarily a remote attack vector.

Generated by OpenCVE AI on April 28, 2026 at 07:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OpenClaw 2026.3.22 or later to eliminate the access control flaw.
  • Restrict or disable the ability for runtime profile mutation in the allowProfiles configuration, limiting profile changes to administrative contexts only.
  • Implement runtime monitoring or logging of proxy profile changes so that unauthorized mutations can be detected and investigated promptly.

Generated by OpenCVE AI on April 28, 2026 at 07:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 25 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile mutation and runtime profile selection. Remote attackers can exploit this by manipulating browser proxy profiles at runtime to access restricted profiles and bypass intended access controls.
Title OpenClaw < 2026.3.22 - allowProfiles Bypass via Profile Mutation and Runtime Selection
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-472
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 7.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-25T01:37:01.016Z

Reserved: 2026-04-20T14:07:26.648Z

Link: CVE-2026-41353

cve-icon Vulnrichment

Updated: 2026-04-25T01:36:57.211Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T22:16:42.493

Modified: 2026-05-01T20:14:12.460

Link: CVE-2026-41353

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T07:30:26Z

Weaknesses