CVE-2026-41382
Received Received - Intake
Authorization Bypass in OpenClaw Discord Voice Ingress Allows Unauthorized Access

Publication date: 2026-04-28

Last updated on: 2026-05-01

Assigner: VulnCheck

Description
OpenClaw before 2026.3.31 contains an authorization bypass vulnerability in Discord voice ingress that allows attackers to bypass channel and member allowlist restrictions. Attackers can exploit stale-role validation gaps and improper channel name validation to gain unauthorized access to restricted voice channels.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-05-01
Generated
2026-05-06
AI Q&A
2026-04-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.31 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of CVE-2026-41382 involves monitoring unauthorized access attempts to Discord voice channels within the OpenClaw platform, specifically looking for users bypassing channel and member allowlist restrictions.

Since the vulnerability exploits stale-role validation gaps and improper channel name validation, detection can focus on identifying voice ingress events from users not present in the configured allowlists.

Suggested detection steps include:

  • Review OpenClaw logs for authorization failures or suspicious voice ingress attempts with messages like "You are not authorized to use this command." or "This channel is not allowlisted for voice commands."
  • Audit Discord voice channel access lists and compare them against actual voice ingress events to identify discrepancies.
  • Use network monitoring tools to capture and analyze traffic related to Discord voice channels, looking for unauthorized voice data transmissions.

No specific commands are provided in the available resources, but typical commands might include:

  • Checking OpenClaw service logs: `grep -i "authorizeDiscordVoiceIngress" /var/log/openclaw.log` or equivalent log files.
  • Using Discord API or bot commands to list current voice channel members and verify against allowlists.
  • Network packet capture tools like `tcpdump` or `wireshark` to monitor voice ingress traffic on relevant ports.

For comprehensive detection, ensure OpenClaw is updated to version 2026.3.31 or later, which includes fixes that enforce strict allowlist checks and provide clearer error messaging for unauthorized access attempts.


Can you explain this vulnerability to me?

CVE-2026-41382 is an authorization bypass vulnerability in OpenClaw versions before 2026.3.31 that affects the Discord voice ingress feature. The flaw allows attackers to bypass channel and member allowlist restrictions by exploiting gaps in stale-role validation and improper channel name validation. This means unauthorized users can gain access to restricted Discord voice channels where they should not be allowed.

The vulnerability arises because the system does not properly enforce allowlist checks on users attempting to join and speak in Discord voice channels, allowing attackers to circumvent these controls.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized users to join and speak in restricted Discord voice channels within the OpenClaw platform. Attackers can bypass configured allowlists that are meant to restrict access, potentially leading to unauthorized voice data being transmitted in sensitive or private channels.

While it does not represent a full authentication breach, it compromises the integrity of access controls, potentially exposing confidential communications or disrupting voice channel operations.


What immediate steps should I take to mitigate this vulnerability?

To mitigate CVE-2026-41382, immediately update OpenClaw to version 2026.3.31 or later, which contains the patch that enforces strict allowlist checks on Discord voice ingress.

  • Apply the patch that tightens authorization controls for voice ingress, ensuring only users explicitly permitted by configured Discord access policies can send voice data.
  • Verify that your Discord guild and channel configurations use proper allowlist settings and avoid relying on dangerous name matching or stale role validations.
  • Review and enforce group policies at the provider or guild level to ensure voice ingress is restricted to allowlisted users only.
  • Monitor authorization failure messages such as "You are not authorized to use this command." or "This channel is not allowlisted for voice commands." to detect unauthorized access attempts.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart