Agentic Consent Bypass in OpenClaw by OpenClaw
CVE-2026-41349

8.7HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2026-41349?

OpenClaw prior to version 2026.3.28 is vulnerable to an agentic consent bypass vulnerability. This flaw enables attackers to manipulate the config.patch parameter, allowing them to silently disable execution approval. As a result, malicious actors can exploit this vulnerability to bypass essential security measures, leading to unauthorized operations executed without any form of user consent.

Affected Version(s)

OpenClaw 0 < 2026.3.28

OpenClaw 2026.3.28

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Edward-x (@YLChen-007)
.