Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xj9w-5r6q-x6v4 | OpenClaw: Device-Paired Node Skips Node Scope Gate → Host RCE.md |
Fri, 24 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.31 contains a remote code execution vulnerability where a device-paired node can bypass the node scope gate authentication mechanism. Attackers with device pairing credentials can execute arbitrary node commands on the host system without proper node pairing validation. | |
| Title | OpenClaw < 2026.3.31 - Remote Code Execution via Node Scope Gate Bypass | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-862 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-24T16:36:50.278Z
Reserved: 2026-04-20T14:07:26.648Z
Link: CVE-2026-41352
Updated: 2026-04-24T16:36:46.965Z
Status : Analyzed
Published: 2026-04-23T22:16:42.327
Modified: 2026-04-28T18:54:57.147
Link: CVE-2026-41352
No data.
OpenCVE Enrichment
Updated: 2026-04-28T07:30:26Z
Github GHSA