PT-2026-33867 · Openclaw+1 · Openclaw

Keensecuritylab

·

Published

2026-04-03

·

Updated

2026-04-21

·

CVE-2026-41300

CVSS v4.0

6.9

Medium

AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Summary

Remote onboarding preserves attacker-discovered endpoint after trust decline, routing gateway credentials to it

Current Maintainer Triage

  • Status: narrow
  • Normalized severity: medium
  • Assessment: Real shipped onboarding trust-decline bug because the declined discovered URL survived into the manual prompt, but operator acceptance of that prefill is still required, so medium.

Affected Packages / Versions

  • Package: openclaw (npm)
  • Latest published npm version: 2026.3.31
  • Vulnerable version range: <=2026.3.28
  • Patched versions: >= 2026.3.31
  • First stable tag containing the fix: v2026.3.31

Fix Commit(s)

  • 2a75416634837c21ed05b8c3ed906eb7a7807060 — 2026-03-30T20:03:06+01:00

Release Process Note

  • The fix is already present in released version 2026.3.31.
  • This draft looks ready for final maintainer disposition or publication, not additional code-fix work.
Thanks @zsxsoft for reporting.

Fix

Weakness Enumeration

Related Identifiers

CVE-2026-41300
GHSA-9F4W-67G7-MQWV

Affected Products

Openclaw