Description
OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation. Attackers can exploit this by declaring operator scopes on non-Control-UI clients, allowing self-declared scopes to persist on identity-bearing authentication paths and escalate privileges.
Published: 2026-04-28
Score: 7.7 High
EPSS: n/a
KEV: No
Impact: Operator.Admin privilege escalation
Action: Immediate Patch
AI Analysis

Impact

OpenClaw versions prior to 2026.3.31 contain an incomplete scope‑clearing bug in trusted‑proxy authentication that lets attackers declare operator scopes on non‑Control‑UI clients. By doing so, self‑declared scopes persist on identity‑bearing authentication paths and grant the attacker operator.admin privileges, effectively allowing full administrative control over the application. The flaw represents an improper authorization weakness (CWE‑863).

Affected Systems

The vulnerability affects the OpenClaw product from the vendor OpenClaw. All installations running any version earlier than 2026.3.31 that rely on trusted‑proxy authentication are susceptible.

Risk and Exploitability

The CVSS score of 7.7 indicates high severity, and the EPSS score is not reported, suggesting a lower but still measurable risk of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack path is inferred to require a trusted‑proxy authentication context; an attacker can script scope declaration through a non‑Control‑UI client to hijack the session. Given the administrative gain, the impact is significant for confidentiality, integrity, and availability of the underlying systems.

Generated by OpenCVE AI on April 29, 2026 at 01:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch that updates OpenClaw to version 2026.3.31 or later, which corrects the scope‑clearing logic.
  • If a patch cannot be applied immediately, disable or remove the trusted‑proxy authentication pathway until the fix is available.
  • Enable logging and monitor for unexpected operator scope claims; set alerts for suspicious or failed scope declarations to detect unauthorized escalations.

Generated by OpenCVE AI on April 29, 2026 at 01:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation. Attackers can exploit this by declaring operator scopes on non-Control-UI clients, allowing self-declared scopes to persist on identity-bearing authentication paths and escalate privileges.
Title OpenClaw < 2026.3.31 - Operator Admin Privilege Escalation via Trusted-Proxy Authentication
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-28T18:10:01.883Z

Reserved: 2026-04-20T14:15:22.223Z

Link: CVE-2026-41404

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-28T19:37:43.957

Modified: 2026-04-28T20:10:23.367

Link: CVE-2026-41404

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T01:30:06Z

Weaknesses