Privilege Escalation Vulnerability in OpenClaw by OpenClaw
CVE-2026-41371

8.4HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
27 April 2026

What is CVE-2026-41371?

OpenClaw versions prior to 2026.3.28 exhibit a vulnerability in the chat.send function, which allows unauthorized users to execute administrative session reset commands. By exploiting this improper authorization, attackers can manipulate target sessions, overwrite existing session data, and generate new session IDs, effectively bypassing the necessary admin privileges. This poses significant risks by allowing unauthorized access to sensitive session management features.

Affected Version(s)

OpenClaw 0 < 2026.3.28

OpenClaw 2026.3.28

References

CVSS V4

Score:
8.4
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Peng Zhou (@zpbrent)
.