Vulnerability Description
OpenClaw before 2026.3.31 contains an allowlist bypass vulnerability in Matrix thread root and reply context handling that fails to properly validate message senders. Attackers can fetch thread-root and reply context messages that should be filtered by sender allowlists, bypassing access controls.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.3.31 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/8a563d603b70ef6338915f0527bee87282c3Patch
- https://github.com/openclaw/openclaw/security/advisories/GHSA-rg8m-3943-vm6qVendor Advisory
- https://www.vulncheck.com/advisories/openclaw-matrix-thread-context-allowlist-byThird Party Advisory
FAQ
What is CVE-2026-41376?
CVE-2026-41376 is a vulnerability with a CVSS score of 5.4 (MEDIUM). OpenClaw before 2026.3.31 contains an allowlist bypass vulnerability in Matrix thread root and reply context handling that fails to properly validate message senders. Attackers can fetch thread-root a...
How severe is CVE-2026-41376?
CVE-2026-41376 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41376?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.