Armis Logo< Back

CVE-2026-41394:

OpenClaw before 2026.3.31 contains an authentication bypass vulnerability (CWE-862) that allows unauthenticated users to access plugin-auth HTTP routes with operator runtime write scopes, enabling unauthorized privileged actions.


Score
Info
A numerical rating that indicates how dangerous this vulnerability is.

8.2High
  • Published Date:Apr 28, 2026
  • CISA KEV Date:*No Data*
  • Industries Affected:20

Exploitability

  • Score:3.9
  • Attack Vector:NETWORK
  • Attack Complexity:LOW
  • Privileges Required:NONE
  • User Interaction:NONE
  • Scope:UNCHANGED

Impact

  • Score:4.2
  • Confidentiality Impact:LOW
  • Integrity Impact:HIGH
  • Availability Impact:NONE

Description Preview

OpenClaw before 2026.3.31 contains an authentication bypass vulnerability (CWE-862) that allows unauthenticated users to access plugin-auth HTTP routes with operator runtime write scopes, enabling unauthorized privileged actions.

Overview

OpenClaw before 2026.3.31 suffers from a missing authorization flaw in its plugin-auth HTTP route handling. These routes, which are accessible without authentication, are improperly scoped with operator-level runtime write permissions. As a result, any unauthenticated network-accessible attacker can invoke privileged runtime actions that should be restricted to authenticated operators. The attack requires no prior access, no user interaction, and no complex preconditions, making it trivially exploitable from any network location with access to the OpenClaw service. The primary risk is unauthorized modification of runtime state with a secondary risk of limited information disclosure.

Remediation

  • Users of OpenClaw should upgrade to version 2026.3.31 or later, which addresses this vulnerability by ensuring that plugin-auth HTTP routes no longer receive operator runtime write scopes without proper authentication. Organizations that cannot immediately upgrade should consider implementing network-level controls such as firewall rules or reverse proxy authentication to restrict access to the affected routes until a patch can be applied. The fix is available via the commit referenced in the official GitHub repository.

References

Industries Affected

Below is a list of industries most commonly impacted or potentially at risk based on intelligence.

Low
Mining icon
Mining
Utilities icon
Utilities
Information icon
Information
Construction icon
Construction
Retail Trade icon
Retail Trade
Manufacturing icon
Manufacturing
Wholesale Trade icon
Wholesale Trade
Educational Services icon
Educational Services
Finance and Insurance icon
Finance and Insurance
Public Administration icon
Public Administration
Real Estate Rental and Leasing icon
Real Estate Rental and Leasing
Transportation and Warehousing icon
Transportation and Warehousing
Accommodation and Food Services icon
Accommodation and Food Services
Health Care and Social Assistance icon
Health Care and Social Assistance
Arts, Entertainment, and Recreation icon
Arts, Entertainment, and Recreation
Management of Companies and Enterprises icon
Management of Companies and Enterprises
Agriculture, Forestry, Fishing and Hunting icon
Agriculture, Forestry, Fishing and Hunting
Other Services (except Public Administration) icon
Other Services (except Public Administration)
Professional, Scientific, and Technical Services icon
Professional, Scientific, and Technical Services
Administrative and Support and Waste Management and Remediation Services icon
Administrative and Support and Waste Management and Remediation Services

Focus on What Matters

See everything.Identify true risk.Proactively mitigate threats.Book a Demo

Let's talk!