Untriaged
Permalink
CVE-2026-32057
5.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): HIGH
- Availability impact (A): NONE
OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter
OpenClaw versions prior to 2026.2.25 contain an authentication bypass vulnerability in the trusted-proxy Control UI pairing mechanism that accepts client.id=control-ui without proper device identity verification. An authenticated node role websocket client can exploit this by using the control-ui client identifier to skip pairing requirements and gain unauthorized access to node event execution flows.
References
-
GitHub Security Advisory (GHSA-vvgp-4c28-m3jm) third-party-advisory
-
Patch Commit patch
Affected products
OpenClaw
- ==2026.2.25
- <2026.2.25
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>