


Perceptive Security
SOC/SIEM Consultancy

OpenClaw before 2026.3.31 contains an authentication bypass vulnerability where unauthenticated plugin-auth HTTP routes receive operator runtime write scopes. A…
Published:
27 april 2026 om 22:00:00
Alert date:
28 april 2026 om 21:20:20
Source:
nvd.nist.gov
Identity & Access, Web Technologies
OpenClaw versions before 2026.3.31 contain a critical authentication bypass vulnerability in plugin-auth HTTP routes. The vulnerability allows unauthenticated attackers to access routes that improperly receive operator runtime write scopes. This enables unauthorized users to perform privileged runtime actions that should only be available to authenticated operators. The issue represents a complete bypass of authentication controls for sensitive administrative functions. Multiple security advisories and patches have been released to address this critical security flaw.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-41394
https://github.com/openclaw/openclaw/commit/2a1db0c0f1fa375004a95ba0ef030534790a6d47
https://github.com/openclaw/openclaw/security/advisories/GHSA-mhgq-xpfq-6r66
https://www.vulncheck.com/advisories/openclaw-unauthorized-operator-scope-access-in-unauthenticated-plugin-auth-routes
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
