Access Control Bypass in OpenClaw Affects Secure Allowlisting
CVE-2026-41910

2.3LOW

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
28 April 2026

What is CVE-2026-41910?

In specific versions of OpenClaw prior to 2026.4.8, a security flaw allows authorized non-owner users to modify the allowlist through the /allowlist endpoint, bypassing the enforced owner-only restrictions. This compromise permits alterations across different channels, undermining the application’s intended access control framework and potentially allowing unauthorized changes to sensitive allowlist entries.

Affected Version(s)

OpenClaw 0 < 2026.4.8

OpenClaw 2026.4.8

References

CVSS V4

Score:
2.3
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zsx (@zsxsoft)
KeenSecurityLab
.