Sender Allowlist Bypass Vulnerability in OpenClaw Software by OpenClaw
CVE-2026-41406

2.3LOW

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
28 April 2026

What is CVE-2026-41406?

OpenClaw before version 2026.3.31 is prone to a sender allowlist bypass vulnerability that could allow remote attackers to retrieve restricted messages. By exploiting thread history and quoted messages, attackers can bypass sender allowlist restrictions, ultimately leading to unauthorized access to sensitive content. It is crucial for users of OpenClaw to apply available patches to mitigate this risk.

Affected Version(s)

OpenClaw 0 < 2026.3.31

OpenClaw 2026.3.31

References

CVSS V4

Score:
2.3
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

AntAISecurityLab
.