Changeflow GovPing Data Privacy & Cybersecurity 3 High Severity RCE Vulnerabilities in OpenClaw...
Priority review Notice Added Final

3 High Severity RCE Vulnerabilities in OpenClaw, CVSS 8.1-8.8, Patch Immediately

Favicon for ccb.belgium.be Belgium CCB News alt
Published
Detected
Email

Summary

The Centre for Cybersecurity Belgium (CCB) has issued a security warning detailing three high-severity Remote Code Execution (RCE) vulnerabilities in OpenClaw, an open-source AI agent platform. CVE-2026-41352 and CVE-2026-41349 both carry a CVSS score of 8.8 and affect versions before 2026.3.31 and 2026.3.28 respectively, while CVE-2026-41353 scores 8.1 and affects versions before 2026.3.22. The CCB strongly recommends immediate patching after thorough testing and advises organizations to upscale monitoring and detection capabilities to identify any related suspicious activity.

“The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.”

CCB , verbatim from source
Why this matters

Organizations running OpenClaw internally should treat these vulnerabilities as critical priorities given their placement on sensitive automated pipelines. Security teams should verify whether OpenClaw instances are internet-accessible or exposed via misconfigured network settings, as the CVSS vector (AV:N) confirms network-based exploitation is possible. The absence of public proof-of-concept code at time of publication provides a narrow window for patching before weaponization.

AI-drafted from the source document, validated against GovPing's analyst note standards . For the primary regulatory language, read the source document .
Published by CCB on ccb.belgium.be . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors Belgium CCB News alt for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 6 changes logged to date.

What changed

The CCB published a security advisory disclosing three critical vulnerabilities in OpenClaw versions prior to 2026.3.31 (CVE-2026-41352), 2026.3.28 (CVE-2026-41349), and 2026.3.22 (CVE-2026-41353). CVE-2026-41352 is a missing authorization flaw enabling attackers with device pairing credentials to bypass node pairing validation. CVE-2026-41349 is an agentic consent bypass allowing attackers to disable LLM agent execution approval. CVE-2026-41353 is an access control bypass via allowProfiles that enables attackers to access restricted profiles by modifying browser proxy settings at runtime.

Organizations running OpenClaw in internal environments with access to sensitive systems and data should apply patches immediately, as exploitation could result in full system compromise. The CCB notes that while patching prevents future exploitation, it does not remediate any historic compromise that may have already occurred. Security teams should review OpenClaw deployments and assess whether monitoring for indicators of compromise is warranted given the critical nature of these vulnerabilities.

What to do next

  1. Install updates for vulnerable OpenClaw devices with highest priority after thorough testing
  2. Upscale monitoring and detection capabilities to identify related suspicious activity

Archived snapshot

Apr 24, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Warning: 3 high severity vulnerabilities in OpenClaw can lead to RCE, Patch Immediately!

Image

Published : 24/04/2026

  • Last update:  24/04/2026
  • Affected software: OpenClaw
  • Type: Remote Code Execution (RCE)
  • CVE/CVSS: → CVE-2026-41352: CVSS 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) → CVE-2026-41349: CVSS 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) → CVE-2026-41353: CVSS 8.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)

Sources

Risks

Three high criticality vulnerabilities have recently been discovered in OpenClaw which if exploited, could allow network-based attackers to execute code remotely and compromise the entire platform.

OpenClaw is an open-source, self-hosted AI agent platform built to automate workflows, handle event-driven processes, and orchestrate tasks. It is typically used within internal environments, where automated pipelines operate directly on sensitive systems and data.
As of 2026-04-24, there are no indications that either of those three vulnerabilities are being exploited in the wild, nor is there a publicly available proof of concept.

Exploiting CVE-2026-41352 or CVE-2026-41349 could have a high impact on all aspects of the CIA triad (confidentiality, integrity, availability) affecting the OpenClaw plarform. Exploiting CVE-2026-41353 could have a high impact on the confidentiality and integrity of the platform but no impact on its availability.

Description

CVE-2026-41352
This missing authorization vulnerability affects all OpenClaw versions before 2026.3.31. Attackers that have acquired device pairing credentials, with low privileges and without user interaction, can exploit this vulnerability to bypass node pairing validation and execute commands remotely. That could cause service disruption and data theft.
CVE-2026-41349
This high criticality, agentic consent bypass vulnerability affects all OpenClaw versions before 2026.3.28. Remote attackers with low privileges and without user interaction, can exploit this vulnerability to modify the config.patch parameter to disable the execution approval of LLM agents. That way the attacker can execute operations without the madatory prior user approval to perform unauthorized actions which can go undetected and can lead to system compromise.
CVE-2026-41353
This high criticality, access control bypass vulnerability affects all OpenClaw versions before 2026.3.22. Remote attackers with low privileges and without user interaction can exploit this vulnerability to access restricted profiles and bypass security controls. They could accompish that by modifying browser proxy profiles at runtime because of a flaw in the allowProfiles feature. That way they can gain access to confidential information and modify it without authorization.

Recommended Actions

Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.

Monitor/Detect

The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.

In case of an intrusion, you can report an incident via: https://ccb.belgium.be/report-incident.

While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.

Get daily alerts for Belgium CCB News alt

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CCB.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CCB
Published
April 24th, 2026
Instrument
Notice
Branch
Executive
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Vulnerability patching Security monitoring Threat detection
Geographic scope
BE BE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Artificial Intelligence

Get alerts for this source

We'll email you when Belgium CCB News alt publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!