Untriaged
Permalink
CVE-2026-32045
5.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
OpenClaw < 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscale Auth
OpenClaw versions prior to 2026.2.21 incorrectly apply tokenless Tailscale header authentication to HTTP gateway routes, allowing bypass of token and password requirements. Attackers on trusted networks can exploit this misconfiguration to access HTTP gateway routes without proper authentication credentials.
References
-
GitHub Security Advisory (GHSA-hff7-ccv5-52f8) third-party-advisory
-
Patch Commit patch
Affected products
OpenClaw
- ==2026.2.21
- <2026.2.21
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>