CVE-2026-41378
Received Received - Intake
Privilege Escalation in OpenClaw Node Component Enables RCE

Publication date: 2026-04-28

Last updated on: 2026-05-01

Assigner: VulnCheck

Description
OpenClaw before 2026.3.31 contains a privilege escalation vulnerability allowing paired nodes with role=node to dispatch node.event agent requests with unrestricted gateway-side tool access. Attackers with trusted paired node credentials can escalate privileges by leveraging unrestricted agent.request dispatch to achieve remote code execution on the gateway.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-05-01
Generated
2026-05-07
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.31 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-41378 is a privilege escalation vulnerability in OpenClaw versions before 2026.3.31. It allows paired nodes with the role "node" to dispatch node.event agent requests without proper restrictions, granting them unrestricted access to gateway-side tools.

Attackers who already have trusted paired node credentials can exploit this flaw to escalate their privileges and achieve remote code execution on the gateway device.

The vulnerability arises because the system does not properly restrict which tools a paired node can access via agent requests, allowing broader access than intended.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker with trusted paired node credentials to escalate their privileges and execute arbitrary code remotely on the OpenClaw gateway.

This means the attacker could potentially take full control of the gateway, access sensitive data, manipulate system functions, or disrupt normal operations.

The impact is considered high severity due to the possibility of remote code execution and full gateway compromise.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves identifying if paired nodes with the role "node" are dispatching unrestricted node.event agent requests that could lead to privilege escalation.

Since the vulnerability allows remote code execution via unrestricted dispatch of node.event agent requests, monitoring logs for unusual or unauthorized agent requests from paired nodes is critical.

Specifically, you can check for dispatches of node.event agent requests that access gateway-side tools beyond the safe subset ("canvas", "image", "pdf", "tts", "web_fetch", "web_search").

Commands to detect this might include searching gateway logs or audit trails for agent requests originating from paired nodes with role=node that invoke disallowed tools such as "exec", "read", "write", "edit", "message", "sessions_send", or "subagents".

For example, on systems where OpenClaw logs are accessible, you could use commands like:

  • grep -i 'node.event agent.request' /var/log/openclaw.log | grep -E 'exec|read|write|edit|message|sessions_send|subagents'
  • journalctl -u openclaw | grep 'node.event agent.request' | grep -vE 'canvas|image|pdf|tts|web_fetch|web_search'

Additionally, monitoring for unexpected remote code execution attempts or unusual system event logs prefixed with "System (untrusted):" may help identify exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade OpenClaw to version 2026.3.31 or later, where the vulnerability has been fixed.

The fix restricts the dispatch of node.event agent requests from paired nodes by enforcing a whitelist of allowed gateway-side tools, preventing unauthorized privilege escalation.

If immediate upgrade is not possible, consider restricting or monitoring paired node credentials and their ability to dispatch agent requests, limiting trusted node access.

Additionally, review and harden trust boundaries for node-originated events, sanitize inbound event data, and ensure system event logs clearly mark untrusted events to prevent confusion or exploitation.

Implement network-level controls to restrict access to the OpenClaw gateway from untrusted nodes and monitor for suspicious activity.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not explicitly address how CVE-2026-41378 impacts compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart