CVE-2026-42429

HIGH

OpenClaw < 2026.4.8 - Privilege Escalation via Gateway Plugin HTTP Authentication

Title source: cna
STIX 2.1

Description

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability in the gateway plugin HTTP authentication mechanism that widens identity-bearing operator.read requests into runtime operator.write permissions. Attackers can exploit this by sending read-scoped requests through the gateway auth route to gain unauthorized write access to runtime operations.

Scores

CVSS v3 7.1
EPSS 0.0006
EPSS Percentile 17.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-863
Status published
Products (2)
OpenClaw/OpenClaw < 2026.4.8
OpenClaw/OpenClaw 2026.4.8
Published Apr 28, 2026
Tracked Since Apr 29, 2026