← Volver a CVEs
CVE-2026-41371
HIGH8.5
Descripcion
OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in chat.send that allows write-scoped gateway callers to trigger admin-only session reset operations. Attackers can rotate target sessions, archive prior transcript state, and force new session IDs without requiring admin scope by exploiting improper authorization checks in the chat.send path.
Detalles CVE
Puntuacion CVSS v3.18.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado4/28/2026
Ultima modificacion4/28/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
openclaw:openclaw
Debilidades (CWE)
CWE-863
Referencias
https://github.com/openclaw/openclaw/security/advisories/GHSA-5r8f-96gm-5j6g(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-chat-send-reset-command(disclosure@vulncheck.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.