Authorization Bypass in OpenClaw Matrix Room Control Commands
CVE-2026-44110

7.7HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
6 May 2026

What is CVE-2026-44110?

OpenClaw prior to version 2026.4.15 is susceptible to an authorization bypass vulnerability that arises from relying on DM pairing-store entries for Matrix room control-command authorization. This vulnerability allows attackers with DM-paired sender IDs to issue room control commands, circumventing configured allowlists. As a result, malicious actors can potentially exploit this weakness to gain unauthorized privileges and perform sensitive actions within OpenClaw bot rooms.

Affected Version(s)

OpenClaw 0 < 2026.4.15

OpenClaw 2026.4.15

References

CVSS V4

Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nathan (@nexrin)
KeenSecurityLab
qclawer
.