[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-41386":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-29T07:22:50.275Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":28,"aliases":29,"duplicate_of":9,"upstream":30,"downstream":31,"duplicates":32,"related":33,"reserved_at":9,"published_at":34,"modified_at":34,"state":35,"summary":36,"references_raw":43,"kevs":60,"epss":9,"epss_history":61,"metrics":62,"affected":74},"CVE-2026-41386","OpenClaw before 2026.3.22 contains a privilege escalation vulnerability where bootstrap setup codes are not bound to intended device roles and scopes during pairing. Attackers can exploit this during first-use device pairing to escalate privileges beyond their intended role and scope.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-648","Incorrect Use of Privileged APIs","The product does not conform to the API requirements for a function call that requires extra privileges. This could allow attackers to gain privileges by causing the function to be called incorrectly.","weakness","Incomplete","Base","Low",[20,24],{"id":21,"name":22,"techniques":23},"CAPEC-107","Cross Site Tracing",[],{"id":25,"name":26,"techniques":27},"CAPEC-234","Hijacking a privileged process",[],[],[],[],[],[],[],"2026-04-28T18:09:48.856Z","Awaiting Analysis",{"cisa_kev":37,"cisa_ransomware":37,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":38,"severity_score":39,"severity_version":40,"severity_source":41,"severity_vector":42,"severity_status":35},false,"critical",9.1,"v4.0","cve.org","CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",[44,50,55],{"url":45,"sources":46,"tags":48},"https://github.com/openclaw/openclaw/security/advisories/GHSA-gg9v-mgcp-v6m7",[41,47],"nvd",[49],"Vendor Advisory",{"url":51,"sources":52,"tags":53},"https://github.com/openclaw/openclaw/commit/a600c72ed7d0045a27f58bf031d2b36ecb0141c9",[41,47],[54],"Patch",{"url":56,"sources":57,"tags":58},"https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-unbound-bootstrap-setup-codes",[41,47],[59],"Third Party Advisory",[],[],[63,70],{"source":41,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":64,"cvss_v4_0":69},{"baseScore":39,"baseSeverity":65,"vectorString":66,"impactScore":67,"exploitabilityScore":68},"CRITICAL","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",8.7,10,{"baseScore":39,"baseSeverity":65,"vectorString":42,"impactScore":9,"exploitabilityScore":9},{"source":47,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":71,"cvss_v4_0":72},{"baseScore":39,"baseSeverity":65,"vectorString":66,"impactScore":67,"exploitabilityScore":68},{"baseScore":39,"baseSeverity":65,"vectorString":73,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[75],{"ecosystem":9,"name":76,"vendor":76,"product":76,"cpe_part":77,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":78},"openclaw","a",[79],{"version":80,"is_range":81,"range_type":41,"version_start":9,"version_start_type":9,"version_end":82,"version_end_type":83,"fixed_in":9},"\u003C 2026.3.22",true,"2026.3.22","excluding"]