Description
OpenClaw before 2026.3.31 contains an authentication bypass vulnerability where unauthenticated plugin-auth HTTP routes receive operator runtime write scopes. Attackers can access these routes without authentication to perform privileged runtime actions intended for authorized operators.
Published: 2026-04-28
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: Privilege escalation through unauthenticated operator scope access
Action: Immediate Patch
AI Analysis

Impact

OpenClaw before 2026.3.31 contains a flaw that allows an unauthenticated user to send requests to plugin‑auth HTTP routes, resulting in the assignment of operator‑level runtime write scopes. Because these routes are intended for authorized operators only, an attacker can execute privileged runtime actions on the target system. This flaw derives from missing authentication checks (CWE‑862) and enables an attacker to perform actions that compromise system integrity and confidentiality. The likely attack vector is inferred to be remote network access, based on the description that unauthenticated HTTP endpoints are reachable.

Affected Systems

All deployments of OpenClaw version earlier than 2026.3.31 are affected. The vulnerability applies to the OpenClaw product bundled with Node.js environments, as indicated by the CPE string. No specific sub‑products or configuration variants were mentioned, so any standard installation of OpenClaw that satisfies the pre‑2026.3.31 version constraint is vulnerable.

Risk and Exploitability

The CVSS base score of 8.8 classifies this issue as high severity, and the vulnerability can be exploited over the network by any party that can reach the plugin‑auth endpoints. Because the attack requires no authentication and no additional credentials, the risk of exploitation is elevated. The EPSS score is not available, and the issue is not listed in the CISA KEV catalog, but the lack of external exposure controls makes the attack potentially feasible for opportunistic actors. The attack vector is inferred to be network‑based due to the presence of unauthenticated HTTP routes.

Generated by OpenCVE AI on April 29, 2026 at 01:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.3.31 or later, which removes the authentication bypass in the plugin‑auth routes.
  • If an upgrade is not yet possible, limit external access to the plugin‑auth HTTP endpoints by firewall rules or VPN, and enforce authentication wherever feasible.
  • Continuously monitor web server logs for unexpected traffic to the plugin‑auth routes and investigate any suspicious activities.

Generated by OpenCVE AI on April 29, 2026 at 01:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.31 contains an authentication bypass vulnerability where unauthenticated plugin-auth HTTP routes receive operator runtime write scopes. Attackers can access these routes without authentication to perform privileged runtime actions intended for authorized operators.
Title OpenClaw < 2026.3.31 - Unauthorized Operator Scope Access in Unauthenticated Plugin-Auth Routes
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-862
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-28T18:09:54.214Z

Reserved: 2026-04-20T14:13:45.349Z

Link: CVE-2026-41394

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-28T19:37:42.737

Modified: 2026-04-28T20:10:23.367

Link: CVE-2026-41394

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T01:30:06Z

Weaknesses