Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gg9v-mgcp-v6m7 | OpenClaw: Unbound bootstrap setup codes allow privilege escalation during pairing |
Thu, 30 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.22 contains a privilege escalation vulnerability where bootstrap setup codes are not bound to intended device roles and scopes during pairing. Attackers can exploit this during first-use device pairing to escalate privileges beyond their intended role and scope. | |
| Title | OpenClaw < 2026.3.22 - Privilege Escalation via Unbound Bootstrap Setup Codes | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-648 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-29T12:49:41.640Z
Reserved: 2026-04-20T14:12:09.519Z
Link: CVE-2026-41386
Updated: 2026-04-29T12:49:23.035Z
Status : Analyzed
Published: 2026-04-28T19:37:41.770
Modified: 2026-05-01T15:52:35.320
Link: CVE-2026-41386
No data.
OpenCVE Enrichment
Updated: 2026-04-29T00:30:15Z
Github GHSA