Untriaged
Permalink
CVE-2026-32302
8.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): NONE
OpenClaw: Untrusted web origins can obtain authenticated operator.admin access in trusted-proxy mode
OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untrusted origin could connect through a trusted reverse proxy, inherit proxy-authenticated identity, and establish a privileged operator session. This vulnerability is fixed in 2026.3.11.
References
-
https://github.com/openclaw/openclaw/security/advisories/GHSA-5wcw-8jjv-m286 x_refsource_CONFIRM
-
https://github.com/openclaw/openclaw/releases/tag/v2026.3.11 x_refsource_MISC
Affected products
openclaw
- ==< 2026.3.11
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>