CVE-2026-41378
Privilege Escalation in OpenClaw Node Component Enables RCE
Publication date: 2026-04-28
Last updated on: 2026-05-01
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.31 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-41378 is a privilege escalation vulnerability in OpenClaw versions before 2026.3.31. It allows paired nodes with the role "node" to dispatch node.event agent requests without proper restrictions, granting them unrestricted access to gateway-side tools.
Attackers who already have trusted paired node credentials can exploit this flaw to escalate their privileges and achieve remote code execution on the gateway device.
The vulnerability arises because the system does not properly restrict which tools a paired node can access via agent requests, allowing broader access than intended.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker with trusted paired node credentials to escalate their privileges and execute arbitrary code remotely on the OpenClaw gateway.
This means the attacker could potentially take full control of the gateway, access sensitive data, manipulate system functions, or disrupt normal operations.
The impact is considered high severity due to the possibility of remote code execution and full gateway compromise.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves identifying if paired nodes with the role "node" are dispatching unrestricted node.event agent requests that could lead to privilege escalation.
Since the vulnerability allows remote code execution via unrestricted dispatch of node.event agent requests, monitoring logs for unusual or unauthorized agent requests from paired nodes is critical.
Specifically, you can check for dispatches of node.event agent requests that access gateway-side tools beyond the safe subset ("canvas", "image", "pdf", "tts", "web_fetch", "web_search").
Commands to detect this might include searching gateway logs or audit trails for agent requests originating from paired nodes with role=node that invoke disallowed tools such as "exec", "read", "write", "edit", "message", "sessions_send", or "subagents".
For example, on systems where OpenClaw logs are accessible, you could use commands like:
- grep -i 'node.event agent.request' /var/log/openclaw.log | grep -E 'exec|read|write|edit|message|sessions_send|subagents'
- journalctl -u openclaw | grep 'node.event agent.request' | grep -vE 'canvas|image|pdf|tts|web_fetch|web_search'
Additionally, monitoring for unexpected remote code execution attempts or unusual system event logs prefixed with "System (untrusted):" may help identify exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to upgrade OpenClaw to version 2026.3.31 or later, where the vulnerability has been fixed.
The fix restricts the dispatch of node.event agent requests from paired nodes by enforcing a whitelist of allowed gateway-side tools, preventing unauthorized privilege escalation.
If immediate upgrade is not possible, consider restricting or monitoring paired node credentials and their ability to dispatch agent requests, limiting trusted node access.
Additionally, review and harden trust boundaries for node-originated events, sanitize inbound event data, and ensure system event logs clearly mark untrusted events to prevent confusion or exploitation.
Implement network-level controls to restrict access to the OpenClaw gateway from untrusted nodes and monitor for suspicious activity.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not explicitly address how CVE-2026-41378 impacts compliance with common standards and regulations such as GDPR or HIPAA.