OpenClaw before 2026.3.31 contains a remote code execution vulnerability where a device-paired node can bypass the node scope gate authentication mechanism. Attackers with device pairing credentials can execute arbitrary node commands on the host system without proper node pairing validation.
Metrics
Affected Vendors & Products
References
History
Fri, 24 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.31 contains a remote code execution vulnerability where a device-paired node can bypass the node scope gate authentication mechanism. Attackers with device pairing credentials can execute arbitrary node commands on the host system without proper node pairing validation. | |
| Title | OpenClaw < 2026.3.31 - Remote Code Execution via Node Scope Gate Bypass | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-862 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-04-23T21:58:12.361Z
Updated: 2026-04-24T16:36:50.278Z
Reserved: 2026-04-20T14:07:26.648Z
Link: CVE-2026-41352
Updated: 2026-04-24T16:36:46.965Z
Status : Undergoing Analysis
Published: 2026-04-23T22:16:42.327
Modified: 2026-04-24T14:40:53.523
Link: CVE-2026-41352
No data.