Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-32045 (GCVE-0-2026-32045)
Vulnerability from cvelistv5 – Published: 2026-03-21 00:42 – Updated: 2026-03-23 16:42 X_Open Source- CWE-290 - Authentication Bypass by Spoofing
| URL | Tags |
|---|---|
| https://github.com/openclaw/openclaw/security/adv… | third-party-advisory |
| https://github.com/openclaw/openclaw/commit/356d6… | patch |
| https://www.vulncheck.com/advisories/openclaw-aut… | third-party-advisory |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-32045",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-23T16:42:26.773712Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-23T16:42:38.318Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageURL": "pkg:npm/openclaw",
"product": "OpenClaw",
"vendor": "OpenClaw",
"versions": [
{
"lessThan": "2026.2.21",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "2026.2.21",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "2026.2.21",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Peng Zhou (@zpbrent)"
}
],
"datePublic": "2026-02-21T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "OpenClaw versions prior to 2026.2.21 incorrectly apply tokenless Tailscale header authentication to HTTP gateway routes, allowing bypass of token and password requirements. Attackers on trusted networks can exploit this misconfiguration to access HTTP gateway routes without proper authentication credentials."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-290",
"description": "CWE-290: Authentication Bypass by Spoofing",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-21T00:42:19.737Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"name": "GitHub Security Advisory (GHSA-hff7-ccv5-52f8)",
"tags": [
"third-party-advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8"
},
{
"name": "Patch Commit",
"tags": [
"patch"
],
"url": "https://github.com/openclaw/openclaw/commit/356d61aacfa5b0f1d5830716ec59d70682a3e7b8"
},
{
"name": "VulnCheck Advisory: OpenClaw \u003c 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscale Auth",
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-authentication-bypass-in-http-gateway-routes-via-tokenless-tailscale-auth"
}
],
"tags": [
"x_open-source"
],
"title": "OpenClaw \u003c 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscale Auth",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2026-32045",
"datePublished": "2026-03-21T00:42:19.737Z",
"dateReserved": "2026-03-10T19:48:44.964Z",
"dateUpdated": "2026-03-23T16:42:38.318Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-32045",
"date": "2026-05-14",
"epss": "0.00089",
"percentile": "0.25153"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-32045\",\"sourceIdentifier\":\"disclosure@vulncheck.com\",\"published\":\"2026-03-21T01:17:07.140\",\"lastModified\":\"2026-03-24T21:16:28.700\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenClaw versions prior to 2026.2.21 incorrectly apply tokenless Tailscale header authentication to HTTP gateway routes, allowing bypass of token and password requirements. Attackers on trusted networks can exploit this misconfiguration to access HTTP gateway routes without proper authentication credentials.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-290\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"2026.2.21\",\"matchCriteriaId\":\"09CAA52D-0C33-41B4-854A-338CBFC45513\"}]}]}],\"references\":[{\"url\":\"https://github.com/openclaw/openclaw/commit/356d61aacfa5b0f1d5830716ec59d70682a3e7b8\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.vulncheck.com/advisories/openclaw-authentication-bypass-in-http-gateway-routes-via-tokenless-tailscale-auth\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-32045\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-23T16:42:26.773712Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-23T16:42:33.560Z\"}}], \"cna\": {\"tags\": [\"x_open-source\"], \"title\": \"OpenClaw \u003c 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscale Auth\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Peng Zhou (@zpbrent)\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 8.2, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"OpenClaw\", \"product\": \"OpenClaw\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2026.2.21\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"2026.2.21\", \"versionType\": \"semver\"}], \"packageURL\": \"pkg:npm/openclaw\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2026-02-21T00:00:00.000Z\", \"references\": [{\"url\": \"https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8\", \"name\": \"GitHub Security Advisory (GHSA-hff7-ccv5-52f8)\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://github.com/openclaw/openclaw/commit/356d61aacfa5b0f1d5830716ec59d70682a3e7b8\", \"name\": \"Patch Commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://www.vulncheck.com/advisories/openclaw-authentication-bypass-in-http-gateway-routes-via-tokenless-tailscale-auth\", \"name\": \"VulnCheck Advisory: OpenClaw \u003c 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscale Auth\", \"tags\": [\"third-party-advisory\"]}], \"x_generator\": {\"engine\": \"vulncheck\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"OpenClaw versions prior to 2026.2.21 incorrectly apply tokenless Tailscale header authentication to HTTP gateway routes, allowing bypass of token and password requirements. Attackers on trusted networks can exploit this misconfiguration to access HTTP gateway routes without proper authentication credentials.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-290\", \"description\": \"CWE-290: Authentication Bypass by Spoofing\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"2026.2.21\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"shortName\": \"VulnCheck\", \"dateUpdated\": \"2026-03-21T00:42:19.737Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-32045\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-23T16:42:38.318Z\", \"dateReserved\": \"2026-03-10T19:48:44.964Z\", \"assignerOrgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"datePublished\": \"2026-03-21T00:42:19.737Z\", \"assignerShortName\": \"VulnCheck\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-32045
Vulnerability from fkie_nvd - Published: 2026-03-21 01:17 - Updated: 2026-03-24 21:169.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "09CAA52D-0C33-41B4-854A-338CBFC45513",
"versionEndExcluding": "2026.2.21",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenClaw versions prior to 2026.2.21 incorrectly apply tokenless Tailscale header authentication to HTTP gateway routes, allowing bypass of token and password requirements. Attackers on trusted networks can exploit this misconfiguration to access HTTP gateway routes without proper authentication credentials."
},
{
"lang": "es",
"value": "Versiones de OpenClaw anteriores a 2026.2.21 aplican incorrectamente la autenticaci\u00f3n de encabezado de Tailscale sin token a las rutas de puerta de enlace HTTP, permitiendo la omisi\u00f3n de los requisitos de token y contrase\u00f1a. Atacantes en redes de confianza pueden explotar esta mala configuraci\u00f3n para acceder a las rutas de puerta de enlace HTTP sin las credenciales de autenticaci\u00f3n adecuadas."
}
],
"id": "CVE-2026-32045",
"lastModified": "2026-03-24T21:16:28.700",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "disclosure@vulncheck.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
},
"published": "2026-03-21T01:17:07.140",
"references": [
{
"source": "disclosure@vulncheck.com",
"tags": [
"Patch"
],
"url": "https://github.com/openclaw/openclaw/commit/356d61aacfa5b0f1d5830716ec59d70682a3e7b8"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-authentication-bypass-in-http-gateway-routes-via-tokenless-tailscale-auth"
}
],
"sourceIdentifier": "disclosure@vulncheck.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-290"
}
],
"source": "disclosure@vulncheck.com",
"type": "Primary"
}
]
}
GHSA-HFF7-CCV5-52F8
Vulnerability from github – Published: 2026-03-03 18:43 – Updated: 2026-03-24 18:06Summary
When tokenless Tailscale auth is enabled, OpenClaw should only allow forwarded-header auth for Control UI websocket authentication on trusted hosts. In affected versions, that tokenless path could also be used by HTTP gateway auth call sites, which could bypass token/password requirements for HTTP routes in trusted-network deployments.
Affected Packages / Versions
- Package:
openclaw(npm) - Affected range:
<= 2026.2.19-2(latest published npm version as of February 21, 2026) - Patched in: planned
2026.2.21release
Impact
Deployments relying on token/password for HTTP gateway routes could be downgraded to tokenless behavior when Tailscale header auth is enabled. This weakens expected HTTP route authentication boundaries even in trusted-host network setups.
Per SECURITY.md, this does not affect the recommended setup: keep the Gateway loopback-only (or otherwise within a trusted host/network boundary), use Tailscale serve/funnel for remote access, and keep tokenless Tailscale auth scoped to Control UI websocket login.
Fix
- Added an explicit auth-surface gate (
allowTailscaleHeaderAuth, defaultfalse) in gateway auth. - Enabled tokenless Tailscale header auth only for Control UI websocket authentication.
- Kept HTTP gateway auth call sites on token/password auth paths.
- Added regression coverage for HTTP-vs-websocket behavior and Tailscale header handling.
Fix Commit(s)
356d61aacfa5b0f1d5830716ec59d70682a3e7b8
Release Process Note
patched_versions is pre-set to the planned next release (2026.2.21) so once npm release is published, this advisory can be published directly without further field edits.
OpenClaw thanks @zpbrent for reporting.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2026.2.21"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-32045"
],
"database_specific": {
"cwe_ids": [
"CWE-290"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-03T18:43:04Z",
"nvd_published_at": null,
"severity": "MODERATE"
},
"details": "### Summary\nWhen tokenless Tailscale auth is enabled, OpenClaw should only allow forwarded-header auth for Control UI websocket authentication on trusted hosts. In affected versions, that tokenless path could also be used by HTTP gateway auth call sites, which could bypass token/password requirements for HTTP routes in trusted-network deployments.\n\n### Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected range: `\u003c= 2026.2.19-2` (latest published npm version as of February 21, 2026)\n- Patched in: planned `2026.2.21` release\n\n### Impact\nDeployments relying on token/password for HTTP gateway routes could be downgraded to tokenless behavior when Tailscale header auth is enabled. This weakens expected HTTP route authentication boundaries even in trusted-host network setups.\n\nPer SECURITY.md, this does not affect the recommended setup: keep the Gateway loopback-only (or otherwise within a trusted host/network boundary), use Tailscale serve/funnel for remote access, and keep tokenless Tailscale auth scoped to Control UI websocket login.\n\n### Fix\n- Added an explicit auth-surface gate (`allowTailscaleHeaderAuth`, default `false`) in gateway auth.\n- Enabled tokenless Tailscale header auth only for Control UI websocket authentication.\n- Kept HTTP gateway auth call sites on token/password auth paths.\n- Added regression coverage for HTTP-vs-websocket behavior and Tailscale header handling.\n\n### Fix Commit(s)\n- `356d61aacfa5b0f1d5830716ec59d70682a3e7b8`\n\n### Release Process Note\n`patched_versions` is pre-set to the planned next release (`2026.2.21`) so once npm release is published, this advisory can be published directly without further field edits.\n\nOpenClaw thanks @zpbrent for reporting.",
"id": "GHSA-hff7-ccv5-52f8",
"modified": "2026-03-24T18:06:03Z",
"published": "2026-03-03T18:43:04Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32045"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/356d61aacfa5b0f1d5830716ec59d70682a3e7b8"
},
{
"type": "PACKAGE",
"url": "https://github.com/openclaw/openclaw"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openclaw-authentication-bypass-in-http-gateway-routes-via-tokenless-tailscale-auth"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "OpenClaw\u0027s gateway tokenless Tailscale auth applied to HTTP routes"
}
GHSA-QWMF-95R9-GX9X
Vulnerability from github – Published: 2026-03-21 03:31 – Updated: 2026-03-24 18:05Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-hff7-ccv5-52f8. This link is maintained to preserve external references.
Original Description
OpenClaw versions prior to 2026.2.21 incorrectly apply tokenless Tailscale header authentication to HTTP gateway routes, allowing bypass of token and password requirements. Attackers on trusted networks can exploit this misconfiguration to access HTTP gateway routes without proper authentication credentials.
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c 2026.2.21"
},
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-290"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-24T18:05:53Z",
"nvd_published_at": "2026-03-21T01:17:07Z",
"severity": "HIGH"
},
"details": "## Duplicate Advisory\n\nThis advisory has been withdrawn because it is a duplicate of GHSA-hff7-ccv5-52f8. This link is maintained to preserve external references.\n\n## Original Description\nOpenClaw versions prior to 2026.2.21 incorrectly apply tokenless Tailscale header authentication to HTTP gateway routes, allowing bypass of token and password requirements. Attackers on trusted networks can exploit this misconfiguration to access HTTP gateway routes without proper authentication credentials.",
"id": "GHSA-qwmf-95r9-gx9x",
"modified": "2026-03-24T18:05:53Z",
"published": "2026-03-21T03:31:13Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32045"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/356d61aacfa5b0f1d5830716ec59d70682a3e7b8"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openclaw-authentication-bypass-in-http-gateway-routes-via-tokenless-tailscale-auth"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
],
"summary": "Duplicate Advisory: OpenClaw\u0027s gateway tokenless Tailscale auth applied to HTTP routes",
"withdrawn": "2026-03-24T18:05:53Z"
}
CNVD-2026-16048
Vulnerability from cnvd - Published: 2026-04-03厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/openclaw/openclaw/releases
| Name | OpenClaw OpenClaw <2026.2.21 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2026-32045",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2026-32045"
}
},
"description": "OpenClaw\u662fOpenClaw\u5f00\u6e90\u7684\u4e00\u4e2a\u667a\u80fd\u4eba\u5de5\u52a9\u7406\u3002\n\nOpenClaw\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7ed5\u8fc7\u4ee4\u724c\u548c\u5bc6\u7801\u8981\u6c42\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/openclaw/openclaw/releases",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2026-16048",
"openTime": "2026-04-03",
"patchDescription": "OpenClaw\u662fOpenClaw\u5f00\u6e90\u7684\u4e00\u4e2a\u667a\u80fd\u4eba\u5de5\u52a9\u7406\u3002\r\n\r\nOpenClaw\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7ed5\u8fc7\u4ee4\u724c\u548c\u5bc6\u7801\u8981\u6c42\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "OpenClaw\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2026-16048\uff09\u7684\u8865\u4e01",
"products": {
"product": "OpenClaw OpenClaw \u003c2026.2.21"
},
"referenceLink": "https://github.com/openclaw/openclaw/commit/356d61aacfa5b0f1d5830716ec59d70682a3e7b8",
"serverity": "\u9ad8",
"submitTime": "2026-03-26",
"title": "OpenClaw\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2026-16048\uff09"
}
WID-SEC-W-2026-0472
Vulnerability from csaf_certbund - Published: 2026-02-22 23:00 - Updated: 2026-04-12 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenClaw ist ein pers\u00f6nlicher KI-Assistent zur Ausf\u00fchrung auf eigenen Ger\u00e4ten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in OpenClaw ausnutzen, um beliebigen Programmcode auszuf\u00fchren, sich erh\u00f6hte Berechtigungen zu verschaffen, Daten zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen oder andere nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0472 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0472.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0472 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0472"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-25gx-x37c-7pph"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2fgq-7j6h-9rm4"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2hm8-rqrm-xfjq"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2mc2-g238-722j"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2prf-9cw7-fq62"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2rgf-hm63-5qph"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3cvx-236h-m9fj"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3x3x-h76w-hp98"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3xfw-4pmr-4xc5"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-43x4-g22p-3hrq"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-45cg-2683-gfmq"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4cqv-h74h-93j4"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4gc7-qcvf-38wg"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4rqq-w8v4-7p47"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-56pc-6hvp-4gv4"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5847-rm3g-23mw"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5ghc-98wh-gwwf"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5h2c-8v84-qpvr"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5mx2-2mgw-x8rm"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5v6x-rfc3-7qfr"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-62f6-mrcj-v8h5"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-65rx-fvh6-r4h2"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-6j27-pc5c-m8w8"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-74xj-763f-264w"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7fcc-cw49-xm78"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-82g8-464f-2mv7"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-8cp7-rp8r-mg77"
},
{
"category": "external",
"summary": "OpenClaw Security A)dvisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-8fmp-37rc-p5g7"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9p38-94jf-hgjj"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cjv3-m589-v3rx"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-f6h3-846h-2r8w"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-f8mp-vj46-cq8v"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-fg3m-vhrr-8gj6"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gq83-8q7q-9hfx"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jj82-76v6-933r"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jjgj-cpp9-cvpv"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jq4x-98m3-ggq6"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jwf4-8wf4-jf2m"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mfg5-7q5g-f37j"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mqr9-vqhq-3jxw"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rx3g-mvc3-qfjf"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rxxp-482v-7mrh"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v3j7-34xh-6g3w"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vffc-f7r7-rx2w"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vmqr-rc7x-3446"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vvjh-f6p9-5vcf"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w7j5-j98m-w679"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w9cg-v44m-4qv8"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-wpph-cjgr-7c39"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x2g4-7mj7-2hhj"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x9cf-3w63-rpq9"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xgf2-vxv2-rrmg"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xwcr-v472-8hhr"
}
],
"source_lang": "en-US",
"title": "OpenClaw: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-12T22:00:00.000+00:00",
"generator": {
"date": "2026-04-13T06:09:20.312+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0472",
"initial_release_date": "2026-02-22T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "2",
"summary": "CVE-2026-32061, CVE-2026-32062, CVE-2026-32063 erg\u00e4nzt"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "3",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "4",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "5",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2026-03-22T23:00:00.000+00:00",
"number": "6",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "7",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "8",
"summary": "Referenz(en) aufgenommen: GHSA-QWMF-95R9-GX9X"
},
{
"date": "2026-03-31T22:00:00.000+00:00",
"number": "9",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2026-04-12T22:00:00.000+00:00",
"number": "10",
"summary": "CVE-2026-3689, CVE-2026-3690 erg\u00e4nzt"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2026.2.22",
"product": {
"name": "Open Source OpenClaw \u003c2026.2.22",
"product_id": "T051067"
}
},
{
"category": "product_version",
"name": "2026.2.22",
"product": {
"name": "Open Source OpenClaw 2026.2.22",
"product_id": "T051067-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openclaw:openclaw:2026.2.22"
}
}
}
],
"category": "product_name",
"name": "OpenClaw"
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-22168",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22168"
},
{
"cve": "CVE-2026-22169",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22169"
},
{
"cve": "CVE-2026-22170",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22170"
},
{
"cve": "CVE-2026-22174",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22174"
},
{
"cve": "CVE-2026-22177",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22177"
},
{
"cve": "CVE-2026-22179",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22179"
},
{
"cve": "CVE-2026-27158",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27158"
},
{
"cve": "CVE-2026-27159",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27159"
},
{
"cve": "CVE-2026-27164",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27164"
},
{
"cve": "CVE-2026-27165",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27165"
},
{
"cve": "CVE-2026-27209",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27209"
},
{
"cve": "CVE-2026-27524",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27524"
},
{
"cve": "CVE-2026-27566",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27566"
},
{
"cve": "CVE-2026-28455",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-28455"
},
{
"cve": "CVE-2026-29607",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-29607"
},
{
"cve": "CVE-2026-31994",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-31994"
},
{
"cve": "CVE-2026-31995",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-31995"
},
{
"cve": "CVE-2026-32000",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32000"
},
{
"cve": "CVE-2026-32003",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32003"
},
{
"cve": "CVE-2026-32008",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32008"
},
{
"cve": "CVE-2026-32010",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32010"
},
{
"cve": "CVE-2026-32017",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32017"
},
{
"cve": "CVE-2026-32018",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32018"
},
{
"cve": "CVE-2026-32019",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32019"
},
{
"cve": "CVE-2026-32020",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32020"
},
{
"cve": "CVE-2026-32022",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32022"
},
{
"cve": "CVE-2026-32024",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32024"
},
{
"cve": "CVE-2026-32029",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32029"
},
{
"cve": "CVE-2026-32030",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32030"
},
{
"cve": "CVE-2026-32032",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32032"
},
{
"cve": "CVE-2026-32034",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32034"
},
{
"cve": "CVE-2026-32039",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32039"
},
{
"cve": "CVE-2026-32045",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32045"
},
{
"cve": "CVE-2026-32046",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32046"
},
{
"cve": "CVE-2026-32049",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32049"
},
{
"cve": "CVE-2026-32056",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32056"
},
{
"cve": "CVE-2026-32061",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32061"
},
{
"cve": "CVE-2026-32062",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32062"
},
{
"cve": "CVE-2026-32063",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32063"
},
{
"cve": "CVE-2026-32064",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32064"
},
{
"cve": "CVE-2026-32896",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32896"
},
{
"cve": "CVE-2026-32897",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32897"
},
{
"cve": "CVE-2026-32900",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32900"
},
{
"cve": "CVE-2026-32907",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32907"
},
{
"cve": "CVE-2026-32908",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32908"
},
{
"cve": "CVE-2026-3689",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-3689"
},
{
"cve": "CVE-2026-3690",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-3690"
},
{
"cve": "CVE-2026-4039",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-4039"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.