Vulnerability Description
OpenClaw before 2026.4.20 contains an improper authorization vulnerability in paired-device pairing management that allows limited-scope sessions to enumerate and act on pairing requests. Attackers with paired-device access can approve or operate on unrelated pending device requests within the same gateway scope.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.4.20 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/5a12f30441d5b0b151f550daa2c5c9e8db61Patch
- https://github.com/openclaw/openclaw/security/advisories/GHSA-xrq9-jm7v-g9h7Vendor Advisory
- https://www.vulncheck.com/advisories/openclaw-improper-authorization-in-paired-dThird Party Advisory
FAQ
What is CVE-2026-41909?
CVE-2026-41909 is a vulnerability with a CVSS score of 5.4 (MEDIUM). OpenClaw before 2026.4.20 contains an improper authorization vulnerability in paired-device pairing management that allows limited-scope sessions to enumerate and act on pairing requests. Attackers wi...
How severe is CVE-2026-41909?
CVE-2026-41909 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41909?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.