Connect Clawsmith to your coding agent. Ship products like crazy.Unlimited usage during betaGet API Key โ†’
โ† Back to dashboard
clawsmith.com/signal/cve-2026-41386-privilege-escalation-first-use-pairing
โš  IssueWide OpencoreLive

CVE-2026-41386: Critical Privilege Escalation in OpenClaw First-Use Pairing (CVSS 9.1)

CVE-2026-41386 affects OpenClaw before version 2026.3.22. Attackers exploit unbound bootstrap setup codes during first-use device pairing to escalate privileges beyond intended role and scope. CVSS 9.1 critical severity. Published April 28, 2026.

Product Idea from this Signal

A CI/CD security gate that blocks OpenClaw deployments failing CVE, config, and network exposure checks

892 โ–ฒ

OpenClaw has accumulated 138+ CVEs in under 3 months, with 220,000+ instances exposed to the internet and 63% running without authentication. Kaspersky declared it unsafe for use. Existing tools (SecureClaw, Carapace, ClawSec) run audits after deployment, but nothing blocks a bad deployment from going live. This is a pre-deploy security gate that integrates into CI/CD pipelines, runs automated CVE version checks, config hardening validation, and network exposure scans, and fails the deploy if the instance doesn't meet a configurable security baseline.

CLICI-CDSECURITYDEVOPSOPEN-SOURCE
CompetitiveView Opportunity โ†’

Score Breakdown

HN
770

Frequently Asked Questions