Description
OpenClaw before 2026.3.28 contains a privilege escalation vulnerability allowing authenticated operators with write permissions to access admin-class Talk Voice configuration persistence. Attackers with operator.write privileges can exploit the chat.send endpoint to reach and modify sensitive voice configuration settings intended for administrators only.
Published: 2026-04-28
Score: 7.1 High
EPSS: n/a
KEV: No
Impact: Privilege Escalation
Action: Patch
AI Analysis

Impact

OpenClaw versions before 2026.28 expose a privilege escalation flaw that allows an authenticated operator with write rights to exploit the chat.send endpoint and modify the Talk Voice configuration reserved for administrators. The bug stems from insufficient authorization controls (CWE‑863), enabling attackers to change persistent voice configuration data and thereby gain administrative control beyond their granted scope.

Affected Systems

The affected product is OpenClaw as distributed via the node.js package. Any release earlier than 2026.28 is impacted. The vulnerability applies to deployments that expose the chat.send API and grant operator.write permission to users.

Risk and Exploitability

The CVSS score of 7.1 reflects medium severity; the EPSS score is not reported and the flaw is not listed in the CISA KEV catalog. An attacker must first authenticate as an operator with write privileges and then call the publicly accessible chat.send endpoint, which is the likely attack vector. Upon success the attacker can rewrite admin‑only voice settings, potentially enabling further malicious actions such as unauthorized data collection or system disruption.

Generated by OpenCVE AI on April 29, 2026 at 02:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OpenClaw 2026.3.28 or any newer release that resolves the access control flaw
  • Apply the patch provided in the GitHub commit referenced in the advisory to fix the vulnerability in existing installations
  • Restrict the operator.write permission to trusted users only and remove write capabilities from roles that do not require them
  • Monitor and audit changes to the Talk Voice configuration to detect unauthorized modifications

Generated by OpenCVE AI on April 29, 2026 at 02:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.28 contains a privilege escalation vulnerability allowing authenticated operators with write permissions to access admin-class Talk Voice configuration persistence. Attackers with operator.write privileges can exploit the chat.send endpoint to reach and modify sensitive voice configuration settings intended for administrators only.
Title OpenClaw < 2026.3.28 - Privilege Escalation via chat.send to Admin-Class Talk Voice Config
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-29T12:19:25.183Z

Reserved: 2026-04-20T14:12:09.518Z

Link: CVE-2026-41379

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-28T19:37:40.820

Modified: 2026-04-28T20:10:23.367

Link: CVE-2026-41379

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T02:15:47Z

Weaknesses