CVE-2026-41371

HIGH

OpenClaw < 2026.3.28 - Privilege Escalation via chat.send Reset Command

Title source: cna
STIX 2.1

Description

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in chat.send that allows write-scoped gateway callers to trigger admin-only session reset operations. Attackers can rotate target sessions, archive prior transcript state, and force new session IDs without requiring admin scope by exploiting improper authorization checks in the chat.send path.

Scores

CVSS v3 8.5
EPSS 0.0004
EPSS Percentile 11.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-863
Status published
Products (3)
OpenClaw/OpenClaw < 2026.3.28
openclaw/openclaw < 2026.3.28
OpenClaw/OpenClaw 2026.3.28
Published Apr 28, 2026
Tracked Since Apr 28, 2026