Authentication Bypass in OpenClaw Remote Onboarding Component
CVE-2026-41342
7.4HIGH
What is CVE-2026-41342?
OpenClaw versions prior to 2026.3.28 contain an authentication bypass vulnerability in the remote onboarding component. This weakness allows unauthenticated discovery endpoints to persist without confirmation of trust, enabling attackers to spoof these endpoints. Consequently, they can redirect onboarding processes to malicious gateways, which may lead to the unauthorized capture of gateway credentials or sensitive traffic. It is crucial for users of OpenClaw to upgrade to the latest version to mitigate this risk.
Affected Version(s)
OpenClaw 0 < 2026.3.28
OpenClaw 2026.3.28
References
CVSS V4
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Nathan (@nexrin)
KeenSecurityLab
