CVE-2026-41398
Received Received - Intake
Improper Access Control in OpenClaw iOS A2UI Enables Unauthorized Requests

Publication date: 2026-04-28

Last updated on: 2026-04-30

Assigner: VulnCheck

Description
OpenClaw before 2026.4.2 contains an improper access control vulnerability in the iOS A2UI bridge that treats generic local-network pages as trusted origins. Attackers can inject unauthorized agent.request runs by loading attacker-controlled pages from local-network or tailnet hosts, polluting session state and consuming budget.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-30
Generated
2026-05-07
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.4.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-346 The product does not properly verify that the source of data or communication is valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-41398 is an improper access control vulnerability in the iOS A2UI bridge component of the OpenClaw package before version 2026.4.2. The vulnerability occurs because the A2UI bridge mistakenly treats generic local-network pages, including those loaded from local-network or tailnet hosts, as trusted origins. This incorrect trust allows attackers to load malicious pages within the local network that can inject unauthorized agent.request commands into an active iOS node session.

These injected commands can manipulate the session state and consume session budget, effectively polluting the session. However, the vulnerability does not allow execution of owner-only actions or arbitrary code on the host. The issue was fixed by restricting the A2UI action dispatch mechanism to only allow trusted canvas URLs.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker within your local network or tailnet to inject unauthorized agent.request commands into your active iOS OpenClaw sessions. This can lead to manipulation of your session state and consumption of your session budget, which may degrade the performance or reliability of your application.

While it does not allow attackers to execute arbitrary code or perform owner-only actions, the pollution of session state and resource consumption could disrupt normal operations or cause unexpected behavior in your OpenClaw iOS client.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthorized injection of agent.request commands via attacker-controlled pages loaded from local-network or tailnet hosts in the OpenClaw iOS A2UI bridge. Detection would focus on identifying suspicious or unauthorized agent.request dispatches originating from local network or tailnet URLs treated as trusted origins.

Since the vulnerability exploits improper origin validation, monitoring network traffic for unusual requests to the OpenClaw iOS client from local network or tailnet hosts could help detect exploitation attempts.

Specific commands are not provided in the available resources, but general approaches could include:

  • Using network monitoring tools (e.g., tcpdump, Wireshark) to capture and analyze HTTP requests to the affected OpenClaw iOS client, filtering for local network or tailnet IP ranges.
  • Inspecting logs of the OpenClaw iOS client for unexpected agent.request dispatches or session state changes triggered by local network origins.
  • Employing application-level logging or debugging to trace the source URLs of agent.request commands and verify if they originate from trusted canvas URLs or untrusted local network pages.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update OpenClaw to version 2026.4.2 or later, where the vulnerability has been fixed by restricting the A2UI bridge to only trust specific canvas URLs and disallowing generic local-network pages from dispatching agent.request actions.

Until the update can be applied, consider limiting access to the OpenClaw iOS client from local network or tailnet hosts to reduce the risk of exploitation.

Additionally, monitor and audit session states and budget consumption for unusual activity that could indicate exploitation attempts.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of CVE-2026-41398 on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart