CVE-2026-41299 PUBLISHED

OpenClaw < 2026.3.28 - Client Identity Spoofing in chat.send Gateway Provenance Guard

Assigner: VulnCheck
Reserved: 20.04.2026 Published: 20.04.2026 Updated: 20.04.2026

OpenClaw before 2026.3.28 contains an authorization bypass vulnerability in the chat.send gateway method where ACP-only provenance fields are gated by self-declared client metadata from WebSocket handshake rather than verified authorization state. Authenticated operator clients can spoof ACP identity labels and inject reserved provenance fields intended only for the ACP bridge by manipulating client metadata during connection.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 7.1

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.3.28 (excl.)
  • Version 2026.3.28 is unaffected

Credits

  • Peng Zhou (@zpbrent) reporter

References

Problem Types

  • CWE-807 Reliance on Untrusted Inputs in a Security Decision CWE