OpenClaw Discord Bot Vulnerability Allows Unauthorized Exec Approvals

OpenClaw Discord Bot Vulnerability Allows Unauthorized Exec Approvals

The National Vulnerability Database (NVD) has detailed CVE-2026-41303, a high-severity authorization bypass in OpenClaw before version 2026.3.28. This flaw specifically impacts Discord text approval commands, allowing individuals not designated as approvers to resolve pending execution approvals. This is a critical bypass that subverts established security controls.

Attackers can exploit this vulnerability by sending crafted Discord text commands. This action allows them to circumvent the channels.discord.execApprovals.approvers allowlist, effectively granting them the ability to approve pending host execution requests. The CVSS score for this vulnerability is 8.8 (HIGH), reflecting significant impact on confidentiality, integrity, and availability.

This isn’t just a Discord bot misconfiguration; it’s a direct route to unauthorized code execution. If your organization uses OpenClaw for managing critical operations via Discord, this vulnerability represents a severe risk. It undermines the very concept of segregated duties and controlled execution environments. Defenders need to recognize that an attacker gaining this capability could bypass critical gates, leading to full system compromise or data exfiltration.

What This Means For You

  • If your organization uses OpenClaw with Discord for managing execution approvals, you need to prioritize patching to version 2026.3.28 or later immediately. Audit your Discord channels and OpenClaw configurations for any unauthorized approvals or suspicious commands that may have already exploited this bypass.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

CVE-2026-41303 - OpenClaw Discord Bot Unauthorized Exec Approval

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-41303 Auth Bypass OpenClaw before 2026.3.28
CVE-2026-41303 Auth Bypass Discord text approval commands
CVE-2026-41303 Auth Bypass Bypass channels.discord.execApprovals.approvers allowlist
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 21, 2026 at 03:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

Neko Virtual Browser: Authenticated RCE to Admin Takeover

CVE-2026-39386 — Neko is a a self-hosted virtual browser that runs in Docker and uses WebRTC In versions 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1,...

vulnerabilityCVEhigh-severitycwe-20cwe-269cwe-284cwe-639cwe-862
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-39378 — Path Traversal

CVE-2026-39378 — The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. In versions 6.5 through 7.17.0, when `HTMLExporter.embed_images=True`, nbconvert's...

vulnerabilityCVEmedium-severitypath-traversalcwe-22cwe-73
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-39377 — Path Traversal

CVE-2026-39377 — The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions 6.5 through 7.17.0 allow arbitrary file writes...

vulnerabilityCVEmedium-severitypath-traversalcwe-22cwe-73
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 3 IOCs /⚙ 3 Sigma