CVE-2026-42433

MEDIUM

OpenClaw < 2026.4.10 - Unauthorized Matrix Profile Config Persistence Access via operator.write Message Tools

Title source: cna
STIX 2.1

Description

OpenClaw before 2026.4.10 contains an authorization bypass vulnerability allowing operator.write message-tool paths to access Matrix profile persistence requiring admin-level authority. Attackers can exploit insufficient access controls to mutate persistent profile configuration through non-owner message-tool runs.

References (3)

Core 3
Core References
Vendor Advisory vendor-advisory
GitHub Security Advisory (GHSA-7jp6-r74r-995q)
https://github.com/openclaw/openclaw/security/advisories/GHSA-7jp6-r74r-995q
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.4.10 - Unauthorized Matrix Profile Config Persistence Access via operator.write Message Tools
https://www.vulncheck.com/advisories/openclaw-unauthorized-matrix-profile-config-persistence-access-via-operator-write-message-tools

Scores

CVSS v3 6.5
EPSS 0.0003
EPSS Percentile 7.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-862
Status published
Products (3)
npm/openclaw 0 - 2026.4.10npm
OpenClaw/OpenClaw < 2026.4.10
OpenClaw/OpenClaw 2026.4.10
Published May 05, 2026
Tracked Since May 05, 2026