Home

Description

OpenClaw before 2026.3.31 contains an information disclosure vulnerability in the Control Interface bootstrap JSON that exposes version and assistant agent identifiers. Attackers can extract sensitive fingerprinting information from the Control UI bootstrap payload to identify system versions and agent configurations.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-23 | Updated 2026-04-25 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere

Product status

Default status
unaffected

Any version before 2026.3.31
affected

2026.3.31 (semver)
unaffected

Credits

wang dong (@topsec-bunney) reporter

References

github.com/...enclaw/security/advisories/GHSA-hr8g-2q7x-3f4w (GitHub Security Advisory (GHSA-hr8g-2q7x-3f4w)) vendor-advisory

github.com/...ommit/c5c10adc022f42eb75ebb3bf364dd607738683b3 (Patch Commit) patch

www.vulncheck.com/...isclosure-via-control-ui-bootstrap-json (VulnCheck Advisory: OpenClaw < 2026.3.31 - Information Disclosure via Control UI Bootstrap JSON) third-party-advisory

cve.org (CVE-2026-41335)

nvd.nist.gov (CVE-2026-41335)

Download JSON