CVE-2026-41404
Received Received - Intake
Privilege Escalation via Scope-Clearing Flaw in OpenClaw Trusted-Proxy

Publication date: 2026-04-28

Last updated on: 2026-04-30

Assigner: VulnCheck

Description
OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation. Attackers can exploit this by declaring operator scopes on non-Control-UI clients, allowing self-declared scopes to persist on identity-bearing authentication paths and escalate privileges.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-30
Generated
2026-05-07
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.31 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-41404 is a privilege escalation vulnerability in OpenClaw versions before 2026.3.31. It occurs in the trusted-proxy authentication mode due to an incomplete scope-clearing mechanism. Attackers with limited privileges can declare operator scopes on non-Control-UI clients, causing these self-declared scopes to persist on authentication paths that carry real user identities. This persistence allows attackers to escalate their privileges to operator.admin level.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in OpenClaw allows attackers to escalate privileges to operator.admin by exploiting incomplete scope-clearing in trusted-proxy authentication mode. This incorrect authorization (CWE-863) can lead to unauthorized access to sensitive functions or data.

Such unauthorized privilege escalation can impact compliance with common standards and regulations like GDPR and HIPAA, which require strict access controls and protection of personal and sensitive data. Failure to properly enforce authorization may result in unauthorized data access or modification, violating these regulatory requirements.

Therefore, until patched, this vulnerability poses a risk to maintaining compliance with these standards by undermining the integrity of access control mechanisms.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves an incomplete scope-clearing mechanism in OpenClaw's trusted-proxy authentication mode, allowing operator scopes to persist improperly. Detection would involve checking if OpenClaw versions prior to 2026.3.31 are in use and if unauthorized operator scopes are present on non-Control-UI clients.

Since the vulnerability is related to self-declared operator scopes persisting on identity-bearing authentication paths, detection could include monitoring authentication logs or WebSocket connection policies for unexpected operator scope declarations from non-Control-UI clients.

No specific detection commands are provided in the available resources. However, general steps might include:

  • Verify the OpenClaw version installed on your system to ensure it is 2026.3.31 or later.
  • Inspect authentication logs or WebSocket connection logs for sessions authenticated via trusted-proxy mode that have operator scopes assigned without proper device identity binding.
  • Use network monitoring tools to capture and analyze WebSocket traffic for unauthorized scope declarations.

Because no explicit commands or detection scripts are mentioned in the resources, it is recommended to consult OpenClaw's logging and monitoring capabilities or implement custom log analysis to detect anomalous operator scope assignments.


How can this vulnerability impact me? :

This vulnerability allows attackers who have some level of access to escalate their privileges to operator.admin, which is a higher and more powerful privilege level. This can lead to unauthorized administrative control over the system, potentially allowing attackers to perform sensitive operations, modify configurations, or access restricted data.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-41404 vulnerability, you should upgrade OpenClaw to version 2026.3.31 or later, as this version contains the fix that properly clears operator scopes in trusted-proxy authentication mode.

  • Apply the patch introduced in commit 8b88b927cb0747ad24d95b07d35682bf85dc5b0e which enhances scope clearing for trusted-proxy authentication.
  • Avoid using OpenClaw versions prior to 2026.3.31, as they contain an incomplete scope-clearing mechanism that allows privilege escalation.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart