OpenClaw CVE-2026-41394: Authentication Bypass Grants Operator Write Scopes

OpenClaw CVE-2026-41394: Authentication Bypass Grants Operator Write Scopes

The National Vulnerability Database (NVD) reports CVE-2026-41394 in OpenClaw before version 2026.3.31, detailing a critical authentication bypass. This vulnerability allows unauthenticated access to plugin-auth HTTP routes, which are intended for authorized operators. Attackers can exploit this flaw to execute privileged runtime actions, essentially gaining full control over plugin operations without needing any credentials.

This isn’t just a misconfiguration; it’s a fundamental breakdown in access control. The NVD assigns a CVSS score of 8.2 (HIGH), indicating the ease of exploitation (AV:N, AC:L, PR:N, UI:N) and the significant impact on integrity (I:H) and potential compromise of confidentiality (C:L). The lack of authentication required makes this particularly dangerous, as any external actor can trigger these actions.

Defenders need to treat this as a direct threat to their operational integrity. The core issue is that routes designed for high-privilege actions are exposed without proper gatekeeping. This vulnerability highlights the importance of rigorous access control reviews, especially for internal APIs and operational endpoints that might inadvertently be exposed.

What This Means For You

  • If your organization uses OpenClaw, immediately check your version. Patch to 2026.3.31 or later without delay. Audit logs for unauthorized access attempts or unusual activity on `plugin-auth` routes, as this could indicate active exploitation. This isn't theoretical; unauthenticated write scopes are an attacker's dream.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2026-41394: OpenClaw Unauthenticated Operator Write Scope Access

Sigma YAML — free preview
title: CVE-2026-41394: OpenClaw Unauthenticated Operator Write Scope Access
id: scw-2026-04-28-ai-1
status: experimental
level: critical
description: |
  Detects unauthenticated access to OpenClaw's plugin-auth HTTP routes, which is indicative of CVE-2026-41394. Successful exploitation allows attackers to gain operator write scopes without authentication, enabling privileged runtime actions.
author: SCW Feed Engine (AI-generated)
date: 2026-04-28
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-41394/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/plugin-auth'
      cs-method|exact:
          - 'POST'
      sc-status|exact:
          - '200'
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-41394 Auth Bypass OpenClaw before 2026.3.31
CVE-2026-41394 Auth Bypass unauthenticated plugin-auth HTTP routes
CVE-2026-41394 Privilege Escalation operator runtime write scopes
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 28, 2026 at 22:37 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

Featured

Daily Security Digest — 2026-04-28

80 vulnerability disclosures (20 Critical, 60 High) and 25 curated intelligence stories from 9 sources.

daily-digestvulnerabilityCVEcriticalhigh-severitycommand-injectioncwe-77cwe-78privilege-escalationcwe-269
/SCW Daily Digest /CRITICAL

CVE-2026-42431: OpenClaw Vulnerability Allows Persistent Browser Profile Mutation

CVE-2026-42431 — OpenClaw before 2026.4.8 contains a security bypass vulnerability in node.invoke(browser.proxy) that allows mutation of persistent browser profiles. Attackers can exploit this path to...

vulnerabilityCVEhigh-severitycwe-863
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 3 IOCs /⚙ 2 Sigma

OpenClaw CVE-2026-42426: Improper Authorization Allows Node Pairing Bypass

CVE-2026-42426 — OpenClaw before 2026.4.8 contains an improper authorization vulnerability where the node.pair.approve method accepts operator.write scope instead of the narrower operator.pairing scope, allowing unprivileged...

vulnerabilityCVEhigh-severitycwe-863
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 1 IOC /⚙ 2 Sigma