OpenClaw before 2026.3.28 contains a privilege escalation vulnerability allowing authenticated operators with write permissions to access admin-class Telegram configuration and cron persistence settings via the send endpoint. Attackers with operator.write credentials can exploit insufficient access controls to reach sensitive administrative functionality and modify persistence mechanisms.
References
Configurations
History
29 Apr 2026, 13:44
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/b7d70ade3b9900dbe97bd73be9c02e924ff3c986 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-767m-xrhc-fxm7 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-operator-write-to-admin-class-telegram-config-and-cron-persistence - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
23 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 22:16
Updated : 2026-04-29 13:44
NVD link : CVE-2026-41359
Mitre link : CVE-2026-41359
CVE.ORG link : CVE-2026-41359
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-269
Improper Privilege Management
