Description
OpenClaw before 2026.4.15 contains an authorization bypass vulnerability in Matrix room control-command authorization that trusts DM pairing-store entries. Attackers with DM-paired sender IDs can execute room control commands without being in configured allowlists by posting in bot rooms, potentially enabling privileged OpenClaw behavior.
Published: 2026-05-06
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenClaw versions earlier than 2026.4.15 contain an authorization bypass in Matrix room control‑command processing. The system trusts entries in the DM pairing‑store, allowing an attacker who owns a DM‑paired sender ID to submit control commands in bot rooms without being on an allowlist. This flaw can lead to the execution of privileged OpenClaw behavior such as altering room configuration or impostering handling logic, effectively compromising the integrity of the application.

Affected Systems

The vulnerability affects the OpenClaw application across all operating environments, specifically any instance of OpenClaw before the 2026.4.15 release. Users running older releases should verify their version and plan an update.

Risk and Exploitability

The CVSS score of 7.7 indicates a high impact potential. While an EPSS score is not publicly available, the flaw involves privileged command execution and is not listed in CISA’s KEV catalog, suggesting moderate public exposure. Attackers need only possess a DM‑paired sender ID and post within a bot room; the exploit can be carried out from an authenticated session or by exploiting the DM pairing store configuration. The CWE‑863 classification reflects an authority control weakness.

Generated by OpenCVE AI on May 6, 2026 at 21:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the OpenClaw 2026.4.15 release or later to eliminate the bypass.
  • Restrict bot‑room command handling to an explicit allowlist and enforce that only authorized senders can issue control actions.
  • Audit the DM pairing‑store configuration to remove or quarantine untrusted entries, and consider disabling DM pairing if not required for your deployment.

Generated by OpenCVE AI on May 6, 2026 at 21:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.15 contains an authorization bypass vulnerability in Matrix room control-command authorization that trusts DM pairing-store entries. Attackers with DM-paired sender IDs can execute room control commands without being in configured allowlists by posting in bot rooms, potentially enabling privileged OpenClaw behavior.
Title OpenClaw < 2026.4.15 - Authorization Bypass in Matrix Room Control Commands via DM Pairing Store
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-07T13:58:12.038Z

Reserved: 2026-05-05T11:30:46.259Z

Link: CVE-2026-44110

cve-icon Vulnrichment

Updated: 2026-05-07T13:58:07.820Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T20:16:34.760

Modified: 2026-05-06T21:20:52.707

Link: CVE-2026-44110

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T23:45:06Z

Weaknesses