top of page
perceptive_background_267k.jpg

OpenClaw before 2026.3.31 contains an authentication bypass vulnerability where unauthenticated plugin-auth HTTP routes receive operator runtime write scopes. A…

Published:

27 april 2026 om 22:00:00

Alert date:

28 april 2026 om 21:20:20

Source:

nvd.nist.gov

Click to open the original link from this advisory

Identity & Access, Web Technologies

OpenClaw versions before 2026.3.31 contain a critical authentication bypass vulnerability in plugin-auth HTTP routes. The vulnerability allows unauthenticated attackers to access routes that improperly receive operator runtime write scopes. This enables unauthorized users to perform privileged runtime actions that should only be available to authenticated operators. The issue represents a complete bypass of authentication controls for sensitive administrative functions. Multiple security advisories and patches have been released to address this critical security flaw.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page