OpenClaw RCE: Paired Nodes Bypass Auth, Allow Arbitrary Commands
The National Vulnerability Database has disclosed CVE-2026-41352, a high-severity remote code execution (RCE) vulnerability impacting OpenClaw before version 2026.3.31. This flaw, rated 8.8 CVSS, allows attackers with existing device pairing credentials to execute arbitrary node commands on the host system. The core issue is a bypass of the node scope gate authentication mechanism.
This isn’t a zero-day requiring initial access; it’s a critical privilege escalation. An attacker who has already compromised or legitimately obtained device pairing credentials can leverage this vulnerability to move laterally and gain full control without further node pairing validation. The National Vulnerability Database attributes this to CWE-862, a missing authorization vulnerability.
For defenders, this means the attack surface isn’t just external; it’s also internal, targeting trusted relationships. Any system relying on OpenClaw for device-paired node operations needs immediate attention. The attacker’s calculus is straightforward: get a foothold, then exploit this to own the system. It’s a clear path from limited access to full compromise.
What This Means For You
- If your organization utilizes OpenClaw, immediately identify all instances running versions prior to 2026.3.31. Patch these systems to 2026.3.31 or later without delay. Review logs for any unauthorized node command execution, especially from device-paired nodes, as this could indicate an active exploit.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
OpenClaw RCE - Arbitrary Command Execution via Paired Node Bypass - CVE-2026-41352
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41352 | RCE | OpenClaw |
| CVE-2026-41352 | RCE | OpenClaw before 2026.3.31 |
| CVE-2026-41352 | Auth Bypass | device-paired node can bypass the node scope gate authentication mechanism |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 24, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.