CVE-2026-44110 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: May 6, 2026
OpenClaw - Authorization Bypass
Published: May 6, 2026Updated: May 6, 2026Remote Exploitable
Overview
OpenClaw before 2026.4.15 contains an authorization bypass caused by trusting DM pairing-store entries in Matrix room control-command authorization, letting attackers with DM-paired sender IDs execute privileged commands without allowlist membership.
Severity & Score
Severity: High
CVSS Score: 8.8
Impact
Attackers can execute privileged room control commands without authorization, potentially compromising system integrity.
Mitigation
Update to version 2026.4.15 or later.
References
- https://github.com/openclaw/openclaw/commit/2bfd808a83116bd888e3e2633a61473fa2ed81b6
- https://github.com/openclaw/openclaw/commit/f8705f512b09043df02b5da372c33374734bd921
- https://github.com/openclaw/openclaw/security/advisories/GHSA-2gvc-4f3c-2855
- https://www.vulncheck.com/advisories/openclaw-authorization-bypass-in-matrix-room-control-commands-via-dm-pairing-store
Related Resources
Details
- CVE ID
- CVE-2026-44110
- Severity
- High
- CVSS Score
- 8.8
- Type
- broken_access_control
- Status
- unconfirmed
CWE
- CWE-863
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H