CVE-2026-43569
Undergoing Analysis Undergoing Analysis - In Progress
Authentication Bypass in OpenClaw via Malicious Plugins

Publication date: 2026-05-05

Last updated on: 2026-05-05

Assigner: VulnCheck

Description
OpenClaw before 2026.4.9 contains an authentication bypass vulnerability allowing untrusted workspace plugins to be auto-enabled during non-interactive onboarding when provider auth choices are shadowed. Attackers can exploit this by crafting malicious workspace plugins that are automatically selected and enabled during authentication setup without explicit user consent.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-05
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.4.9 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-829 The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

There is no specific information provided in the available resources about detection methods or commands to identify this vulnerability on a network or system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-43569 vulnerability, users should upgrade OpenClaw to version 2026.4.9 or newer, as this version contains the fix that prevents untrusted workspace plugins from being automatically enabled during non-interactive onboarding.

The fix ensures that only trusted provider origins are preferred for authentication choices and excludes untrusted workspace plugins unless explicitly enabled by the user.


Can you explain this vulnerability to me?

CVE-2026-43569 is an authentication bypass vulnerability in OpenClaw versions before 2026.4.9. It allows untrusted workspace plugins to be automatically enabled during non-interactive onboarding when provider authentication choices are shadowed by these untrusted plugins.

Attackers can exploit this by crafting malicious workspace plugins that get automatically selected and enabled during the authentication setup process without explicit user consent. This happens because the system does not properly distinguish between trusted and untrusted provider origins when selecting authentication choices.

The root cause is the inclusion of functionality from an untrusted control sphere (CWE-829), where untrusted plugins can override or collide with legitimate authentication choices.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized activation of untrusted workspace plugins during authentication setup, potentially allowing attackers to bypass authentication controls.

As a result, attackers may gain unauthorized access to sensitive credentials or configuration data by hijacking the authentication process.

This compromises the security of the system by enabling malicious plugins without explicit user consent, increasing the risk of data breaches or unauthorized actions within the affected environment.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows untrusted workspace plugins to be automatically enabled during authentication setup without explicit user consent, potentially leading to unauthorized access to sensitive credentials or configurations.

Such unauthorized access and lack of explicit user consent could negatively impact compliance with standards and regulations like GDPR and HIPAA, which require strict controls over authentication, user consent, and protection of sensitive data.

However, the provided information does not explicitly discuss the direct impact on compliance with these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart