CVE-2026-44109
Severity CVSS v4.0:
CRITICAL
Type:
Unavailable / Other
Publication date:
06/05/2026
Last modified:
07/05/2026
Description
OpenClaw before 2026.4.15 contains an authentication bypass vulnerability in Feishu webhook and card-action validation that allows unauthenticated requests to reach command dispatch. Missing encryptKey configuration and blank callback tokens fail open instead of rejecting requests, enabling attackers to bypass signature verification and replay protection to execute arbitrary commands.
Impact
Base Score 4.0
9.20
Severity 4.0
CRITICAL
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | 2026.4.15 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



