Authentication Bypass in OpenClaw Remote Onboarding Component
CVE-2026-41342

7.4HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2026-41342?

OpenClaw versions prior to 2026.3.28 contain an authentication bypass vulnerability in the remote onboarding component. This weakness allows unauthenticated discovery endpoints to persist without confirmation of trust, enabling attackers to spoof these endpoints. Consequently, they can redirect onboarding processes to malicious gateways, which may lead to the unauthorized capture of gateway credentials or sensitive traffic. It is crucial for users of OpenClaw to upgrade to the latest version to mitigate this risk.

Affected Version(s)

OpenClaw 0 < 2026.3.28

OpenClaw 2026.3.28

References

CVSS V4

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nathan (@nexrin)
KeenSecurityLab
.