OpenClaw Authorization Bypass Puts Operator Privileges at Risk
The National Vulnerability Database has disclosed CVE-2026-41299, a high-severity authorization bypass in OpenClaw before version 2026.3.28. This flaw specifically impacts the chat.send gateway method, allowing authenticated operator clients to spoof Advanced Control Protocol (ACP) identities.
The vulnerability stems from insufficient validation; ACP-only provenance fields are gated by self-declared client metadata during the WebSocket handshake, rather than verified authorization states. This means an attacker can manipulate client metadata during connection to inject reserved provenance fields, effectively bypassing intended ACP bridge restrictions and escalating privileges.
For defenders, this is a clear signal to audit your OpenClaw deployments immediately. An attacker doesn’t need to bypass authentication, only to be an authenticated operator. This significantly lowers the bar for exploitation, as internal threats or compromised operator accounts can leverage this to inject unauthorized commands or data, leading to integrity violations and potential operational disruption. Patching to version 2026.3.28 or later is critical to mitigate this risk.
What This Means For You
- If your organization uses OpenClaw, immediately verify your version. Patch to OpenClaw 2026.3.28 or later to close the CVE-2026-41299 authorization bypass. Additionally, review logs for any suspicious `chat.send` gateway activity from operator accounts that might indicate attempts to spoof ACP identities.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
OpenClaw Authorization Bypass via chat.send - CVE-2026-41299
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41299 | Auth Bypass | OpenClaw before 2026.3.28 |
| CVE-2026-41299 | Auth Bypass | chat.send gateway method |
| CVE-2026-41299 | Auth Bypass | Spoofing ACP identity labels via client metadata during WebSocket handshake |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 21, 2026 at 03:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.