Authorization Bypass in OpenClaw Product by OpenClaw
CVE-2026-41303

8.7HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
20 April 2026

What is CVE-2026-41303?

OpenClaw prior to version 2026.3.28 is susceptible to an authorization bypass vulnerability that affects Discord text approval commands. This flaw allows unauthorized users to resolve pending execution approvals by sending specific Discord text commands, bypassing the designated approvers' allowlist. As a result, attackers can approve host execution requests without proper authorization, posing significant security risks.

Affected Version(s)

OpenClaw 0 < 2026.3.28

OpenClaw 2026.3.28

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

tdjackey
.