CVE-2026-41359

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability allowing authenticated operators with write permissions to access admin-class Telegram configuration and cron persistence settings via the send endpoint. Attackers with operator.write credentials can exploit insufficient access controls to reach sensitive administrative functionality and modify persistence mechanisms.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

29 Apr 2026, 13:44

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/b7d70ade3b9900dbe97bd73be9c02e924ff3c986 - () https://github.com/openclaw/openclaw/commit/b7d70ade3b9900dbe97bd73be9c02e924ff3c986 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-767m-xrhc-fxm7 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-767m-xrhc-fxm7 - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-operator-write-to-admin-class-telegram-config-and-cron-persistence - () https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-operator-write-to-admin-class-telegram-config-and-cron-persistence - Third Party Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw

23 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 22:16

Updated : 2026-04-29 13:44


NVD link : CVE-2026-41359

Mitre link : CVE-2026-41359

CVE.ORG link : CVE-2026-41359


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-269

Improper Privilege Management