Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-32897 (GCVE-0-2026-32897)
Vulnerability from cvelistv5 – Published: 2026-03-21 00:42 – Updated: 2026-03-23 16:43 X_Open Source- CWE-320 - Key Management Error
| URL | Tags |
|---|---|
| https://github.com/openclaw/openclaw/security/adv… | third-party-advisory |
| https://github.com/openclaw/openclaw/commit/c99e7… | patch |
| https://www.vulncheck.com/advisories/openclaw-aut… | third-party-advisory |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-32897",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-23T16:43:06.397652Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-23T16:43:14.696Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageURL": "pkg:npm/openclaw",
"product": "OpenClaw",
"vendor": "OpenClaw",
"versions": [
{
"lessThan": "2026.2.22",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "2026.2.22",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "2026.2.22",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Aether AI (@aether-ai-agent)"
}
],
"datePublic": "2026-02-23T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "OpenClaw versions prior to 2026.2.22 reuse gateway.auth.token as a fallback hash secret for owner-ID prompt obfuscation when commands.ownerDisplay is set to hash and commands.ownerDisplaySecret is unset, creating dual-use of authentication secrets across security domains. Attackers with access to system prompts sent to third-party model providers can derive the gateway authentication token from the hash outputs, compromising gateway authentication security."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-320",
"description": "Key Management Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-21T00:42:32.975Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"name": "GitHub Security Advisory (GHSA-v6x2-2qvm-6gv8)",
"tags": [
"third-party-advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8"
},
{
"name": "Patch Commit",
"tags": [
"patch"
],
"url": "https://github.com/openclaw/openclaw/commit/c99e7696e6893083b256f0a6c88fb060f3a76fb7"
},
{
"name": "VulnCheck Advisory: OpenClaw \u003c 2026.2.22 - Authentication Token Reuse in Owner ID Prompt Hashing Fallback",
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-authentication-token-reuse-in-owner-id-prompt-hashing-fallback"
}
],
"tags": [
"x_open-source"
],
"title": "OpenClaw \u003c 2026.2.22 - Authentication Token Reuse in Owner ID Prompt Hashing Fallback",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2026-32897",
"datePublished": "2026-03-21T00:42:32.975Z",
"dateReserved": "2026-03-16T21:18:44.711Z",
"dateUpdated": "2026-03-23T16:43:14.696Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-32897",
"date": "2026-05-14",
"epss": "0.00075",
"percentile": "0.22598"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-32897\",\"sourceIdentifier\":\"disclosure@vulncheck.com\",\"published\":\"2026-03-21T01:17:10.673\",\"lastModified\":\"2026-03-24T21:07:55.173\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenClaw versions prior to 2026.2.22 reuse gateway.auth.token as a fallback hash secret for owner-ID prompt obfuscation when commands.ownerDisplay is set to hash and commands.ownerDisplaySecret is unset, creating dual-use of authentication secrets across security domains. Attackers with access to system prompts sent to third-party model providers can derive the gateway authentication token from the hash outputs, compromising gateway authentication security.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-320\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"2026.2.22\",\"matchCriteriaId\":\"6EA3E555-7328-4665-9FBC-BF4357239EDF\"}]}]}],\"references\":[{\"url\":\"https://github.com/openclaw/openclaw/commit/c99e7696e6893083b256f0a6c88fb060f3a76fb7\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://www.vulncheck.com/advisories/openclaw-authentication-token-reuse-in-owner-id-prompt-hashing-fallback\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-32897\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-23T16:43:06.397652Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-23T16:43:10.968Z\"}}], \"cna\": {\"tags\": [\"x_open-source\"], \"title\": \"OpenClaw \u003c 2026.2.22 - Authentication Token Reuse in Owner ID Prompt Hashing Fallback\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Aether AI (@aether-ai-agent)\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 6.3, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"LOW\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"OpenClaw\", \"product\": \"OpenClaw\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2026.2.22\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"2026.2.22\", \"versionType\": \"semver\"}], \"packageURL\": \"pkg:npm/openclaw\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2026-02-23T00:00:00.000Z\", \"references\": [{\"url\": \"https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8\", \"name\": \"GitHub Security Advisory (GHSA-v6x2-2qvm-6gv8)\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://github.com/openclaw/openclaw/commit/c99e7696e6893083b256f0a6c88fb060f3a76fb7\", \"name\": \"Patch Commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://www.vulncheck.com/advisories/openclaw-authentication-token-reuse-in-owner-id-prompt-hashing-fallback\", \"name\": \"VulnCheck Advisory: OpenClaw \u003c 2026.2.22 - Authentication Token Reuse in Owner ID Prompt Hashing Fallback\", \"tags\": [\"third-party-advisory\"]}], \"x_generator\": {\"engine\": \"vulncheck\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"OpenClaw versions prior to 2026.2.22 reuse gateway.auth.token as a fallback hash secret for owner-ID prompt obfuscation when commands.ownerDisplay is set to hash and commands.ownerDisplaySecret is unset, creating dual-use of authentication secrets across security domains. Attackers with access to system prompts sent to third-party model providers can derive the gateway authentication token from the hash outputs, compromising gateway authentication security.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-320\", \"description\": \"Key Management Error\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"2026.2.22\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"shortName\": \"VulnCheck\", \"dateUpdated\": \"2026-03-21T00:42:32.975Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-32897\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-23T16:43:14.696Z\", \"dateReserved\": \"2026-03-16T21:18:44.711Z\", \"assignerOrgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"datePublished\": \"2026-03-21T00:42:32.975Z\", \"assignerShortName\": \"VulnCheck\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-V6X2-2QVM-6GV8
Vulnerability from github – Published: 2026-03-03 23:01 – Updated: 2026-03-24 17:55Vulnerability
OpenClaw reused gateway.auth.token (and gateway.remote.token) as a fallback hash secret for owner-ID prompt obfuscation when commands.ownerDisplay=hash and commands.ownerDisplaySecret was unset.
This created secret dual-use between gateway authentication and prompt metadata hashing.
Impact
- Auth-secret dual-use across security domains (gateway auth and prompt metadata hashing).
- Hash outputs are visible to third-party model providers in system prompts.
- No direct plaintext token disclosure.
- Practical risk is highest when operators use weak gateway tokens and leave owner hash secret unset.
Affected Packages / Versions
- Package:
openclaw(npm) - Latest affected published version:
2026.2.21-2 - Vulnerable range:
<= 2026.2.21-2 - Patched version (planned next release):
2026.2.22
Affected Components
src/agents/cli-runner/helpers.tssrc/agents/pi-embedded-runner/run/attempt.tssrc/agents/pi-embedded-runner/compact.ts
Remediation
- Added a shared owner-display resolver and secret-generation helper.
- Removed fallback to
gateway.auth.tokenandgateway.remote.token. - Auto-generates and persists a dedicated
commands.ownerDisplaySecretwhen hash mode is enabled and secret is missing.
Fix Commit(s)
- c99e7696e6893083b256f0a6c88fb060f3a76fb7
Release Process Note
patched_versions is pre-set to the planned next release (2026.2.22). Once npm release 2026.2.22 is published, this advisory only needs to be published.
OpenClaw thanks @aether-ai-agent for reporting.
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 2026.2.21-2"
},
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2026.2.22"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-32897"
],
"database_specific": {
"cwe_ids": [
"CWE-522"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-03T23:01:30Z",
"nvd_published_at": null,
"severity": "LOW"
},
"details": "## Vulnerability\n\nOpenClaw reused `gateway.auth.token` (and `gateway.remote.token`) as a fallback hash secret for owner-ID prompt obfuscation when `commands.ownerDisplay=hash` and `commands.ownerDisplaySecret` was unset.\n\nThis created secret dual-use between gateway authentication and prompt metadata hashing.\n\n## Impact\n\n- Auth-secret dual-use across security domains (gateway auth and prompt metadata hashing).\n- Hash outputs are visible to third-party model providers in system prompts.\n- No direct plaintext token disclosure.\n- Practical risk is highest when operators use weak gateway tokens and leave owner hash secret unset.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Latest affected published version: `2026.2.21-2`\n- Vulnerable range: `\u003c= 2026.2.21-2`\n- Patched version (planned next release): `2026.2.22`\n\n## Affected Components\n\n- `src/agents/cli-runner/helpers.ts`\n- `src/agents/pi-embedded-runner/run/attempt.ts`\n- `src/agents/pi-embedded-runner/compact.ts`\n\n## Remediation\n\n- Added a shared owner-display resolver and secret-generation helper.\n- Removed fallback to `gateway.auth.token` and `gateway.remote.token`.\n- Auto-generates and persists a dedicated `commands.ownerDisplaySecret` when hash mode is enabled and secret is missing.\n\n## Fix Commit(s)\n\n- c99e7696e6893083b256f0a6c88fb060f3a76fb7\n\n## Release Process Note\n\n`patched_versions` is pre-set to the planned next release (`2026.2.22`). Once npm release `2026.2.22` is published, this advisory only needs to be published.\n\nOpenClaw thanks @aether-ai-agent for reporting.",
"id": "GHSA-v6x2-2qvm-6gv8",
"modified": "2026-03-24T17:55:00Z",
"published": "2026-03-03T23:01:30Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32897"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/c99e7696e6893083b256f0a6c88fb060f3a76fb7"
},
{
"type": "PACKAGE",
"url": "https://github.com/openclaw/openclaw"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openclaw-authentication-token-reuse-in-owner-id-prompt-hashing-fallback"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "OpenClaw reuses the gateway auth token in the owner ID prompt hashing fallback"
}
GHSA-8MR2-F9WF-HCFQ
Vulnerability from github – Published: 2026-03-21 03:31 – Updated: 2026-03-24 17:54Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-v6x2-2qvm-6gv8. This link is maintained to preserve external references.
Original Description
OpenClaw versions prior to 2026.2.22 reuse gateway.auth.token as a fallback hash secret for owner-ID prompt obfuscation when commands.ownerDisplay is set to hash and commands.ownerDisplaySecret is unset, creating dual-use of authentication secrets across security domains. Attackers with access to system prompts sent to third-party model providers can derive the gateway authentication token from the hash outputs, compromising gateway authentication security.
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 2026.2.21-2"
},
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2026.2.22"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-522"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-24T17:54:52Z",
"nvd_published_at": "2026-03-21T01:17:10Z",
"severity": "LOW"
},
"details": "### Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-v6x2-2qvm-6gv8. This link is maintained to preserve external references.\n\n### Original Description\nOpenClaw versions prior to 2026.2.22 reuse gateway.auth.token as a fallback hash secret for owner-ID prompt obfuscation when commands.ownerDisplay is set to hash and commands.ownerDisplaySecret is unset, creating dual-use of authentication secrets across security domains. Attackers with access to system prompts sent to third-party model providers can derive the gateway authentication token from the hash outputs, compromising gateway authentication security.",
"id": "GHSA-8mr2-f9wf-hcfq",
"modified": "2026-03-24T17:54:52Z",
"published": "2026-03-21T03:31:15Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32897"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/c99e7696e6893083b256f0a6c88fb060f3a76fb7"
},
{
"type": "PACKAGE",
"url": "https://github.com/openclaw/openclaw"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openclaw-authentication-token-reuse-in-owner-id-prompt-hashing-fallback"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Duplicate Advisory: OpenClaw reuses the gateway auth token in the owner ID prompt hashing fallback",
"withdrawn": "2026-03-24T17:54:52Z"
}
CNVD-2026-15057
Vulnerability from cnvd - Published: 2026-03-26厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/openclaw/openclaw/releases
| Name | OpenClaw OpenClaw <2026.2.22 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2026-32897",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2026-32897"
}
},
"description": "OpenClaw\u662fOpenClaw\u5f00\u6e90\u7684\u4e00\u4e2a\u667a\u80fd\u4eba\u5de5\u52a9\u7406\u3002\n\nOpenClaw 2026.2.22\u4e4b\u524d\u7248\u672c\u5b58\u5728\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u8de8\u5b89\u5168\u57df\u53cc\u91cd\u4f7f\u7528\u8eab\u4efd\u9a8c\u8bc1\u5bc6\u94a5\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f51\u5173\u8eab\u4efd\u9a8c\u8bc1\u4ee4\u724c\u6cc4\u9732\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/openclaw/openclaw/releases",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2026-15057",
"openTime": "2026-03-26",
"patchDescription": "OpenClaw\u662fOpenClaw\u5f00\u6e90\u7684\u4e00\u4e2a\u667a\u80fd\u4eba\u5de5\u52a9\u7406\u3002\r\n\r\nOpenClaw 2026.2.22\u4e4b\u524d\u7248\u672c\u5b58\u5728\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u8de8\u5b89\u5168\u57df\u53cc\u91cd\u4f7f\u7528\u8eab\u4efd\u9a8c\u8bc1\u5bc6\u94a5\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f51\u5173\u8eab\u4efd\u9a8c\u8bc1\u4ee4\u724c\u6cc4\u9732\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "OpenClaw\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\uff08CNVD-2026-15057\uff09\u7684\u8865\u4e01",
"products": {
"product": "OpenClaw OpenClaw \u003c2026.2.22"
},
"referenceLink": "https://github.com/openclaw/openclaw/commit/c99e7696e6893083b256f0a6c88fb060f3a76fb7",
"serverity": "\u4e2d",
"submitTime": "2026-03-26",
"title": "OpenClaw\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\uff08CNVD-2026-15057\uff09"
}
FKIE_CVE-2026-32897
Vulnerability from fkie_nvd - Published: 2026-03-21 01:17 - Updated: 2026-03-24 21:075.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "6EA3E555-7328-4665-9FBC-BF4357239EDF",
"versionEndExcluding": "2026.2.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenClaw versions prior to 2026.2.22 reuse gateway.auth.token as a fallback hash secret for owner-ID prompt obfuscation when commands.ownerDisplay is set to hash and commands.ownerDisplaySecret is unset, creating dual-use of authentication secrets across security domains. Attackers with access to system prompts sent to third-party model providers can derive the gateway authentication token from the hash outputs, compromising gateway authentication security."
},
{
"lang": "es",
"value": "Las versiones de OpenClaw anteriores a la 2026.2.22 reutilizan gateway.auth.token como un secreto de hash de respaldo para la ofuscaci\u00f3n de la solicitud de ID de propietario cuando commands.ownerDisplay est\u00e1 configurado como hash y commands.ownerDisplaySecret no est\u00e1 configurado, creando un doble uso de secretos de autenticaci\u00f3n entre dominios de seguridad. Los atacantes con acceso a las solicitudes del sistema enviadas a proveedores de modelos de terceros pueden derivar el token de autenticaci\u00f3n de la pasarela de las salidas del hash, comprometiendo la seguridad de la autenticaci\u00f3n de la pasarela."
}
],
"id": "CVE-2026-32897",
"lastModified": "2026-03-24T21:07:55.173",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4,
"source": "disclosure@vulncheck.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
},
"published": "2026-03-21T01:17:10.673",
"references": [
{
"source": "disclosure@vulncheck.com",
"tags": [
"Patch"
],
"url": "https://github.com/openclaw/openclaw/commit/c99e7696e6893083b256f0a6c88fb060f3a76fb7"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-authentication-token-reuse-in-owner-id-prompt-hashing-fallback"
}
],
"sourceIdentifier": "disclosure@vulncheck.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-320"
}
],
"source": "disclosure@vulncheck.com",
"type": "Primary"
}
]
}
WID-SEC-W-2026-0472
Vulnerability from csaf_certbund - Published: 2026-02-22 23:00 - Updated: 2026-04-12 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.22
Open Source / OpenClaw
|
<2026.2.22 |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenClaw ist ein pers\u00f6nlicher KI-Assistent zur Ausf\u00fchrung auf eigenen Ger\u00e4ten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in OpenClaw ausnutzen, um beliebigen Programmcode auszuf\u00fchren, sich erh\u00f6hte Berechtigungen zu verschaffen, Daten zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen oder andere nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0472 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0472.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0472 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0472"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-25gx-x37c-7pph"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2fgq-7j6h-9rm4"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2hm8-rqrm-xfjq"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2mc2-g238-722j"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2prf-9cw7-fq62"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2rgf-hm63-5qph"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3cvx-236h-m9fj"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3x3x-h76w-hp98"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3xfw-4pmr-4xc5"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-43x4-g22p-3hrq"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-45cg-2683-gfmq"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4cqv-h74h-93j4"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4gc7-qcvf-38wg"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4rqq-w8v4-7p47"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-56pc-6hvp-4gv4"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5847-rm3g-23mw"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5ghc-98wh-gwwf"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5h2c-8v84-qpvr"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5mx2-2mgw-x8rm"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5v6x-rfc3-7qfr"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-62f6-mrcj-v8h5"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-65rx-fvh6-r4h2"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-6j27-pc5c-m8w8"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-74xj-763f-264w"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7fcc-cw49-xm78"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-82g8-464f-2mv7"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-8cp7-rp8r-mg77"
},
{
"category": "external",
"summary": "OpenClaw Security A)dvisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-8fmp-37rc-p5g7"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9p38-94jf-hgjj"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cjv3-m589-v3rx"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-f6h3-846h-2r8w"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-f8mp-vj46-cq8v"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-fg3m-vhrr-8gj6"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gq83-8q7q-9hfx"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jj82-76v6-933r"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jjgj-cpp9-cvpv"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jq4x-98m3-ggq6"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jwf4-8wf4-jf2m"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mfg5-7q5g-f37j"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mqr9-vqhq-3jxw"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rx3g-mvc3-qfjf"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rxxp-482v-7mrh"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v3j7-34xh-6g3w"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vffc-f7r7-rx2w"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vmqr-rc7x-3446"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vvjh-f6p9-5vcf"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w7j5-j98m-w679"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w9cg-v44m-4qv8"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-wpph-cjgr-7c39"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x2g4-7mj7-2hhj"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x9cf-3w63-rpq9"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xgf2-vxv2-rrmg"
},
{
"category": "external",
"summary": "OpenClaw Security Advisories vom 2026-02-22",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xwcr-v472-8hhr"
}
],
"source_lang": "en-US",
"title": "OpenClaw: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-12T22:00:00.000+00:00",
"generator": {
"date": "2026-04-13T06:09:20.312+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0472",
"initial_release_date": "2026-02-22T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "2",
"summary": "CVE-2026-32061, CVE-2026-32062, CVE-2026-32063 erg\u00e4nzt"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "3",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "4",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "5",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2026-03-22T23:00:00.000+00:00",
"number": "6",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "7",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "8",
"summary": "Referenz(en) aufgenommen: GHSA-QWMF-95R9-GX9X"
},
{
"date": "2026-03-31T22:00:00.000+00:00",
"number": "9",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2026-04-12T22:00:00.000+00:00",
"number": "10",
"summary": "CVE-2026-3689, CVE-2026-3690 erg\u00e4nzt"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2026.2.22",
"product": {
"name": "Open Source OpenClaw \u003c2026.2.22",
"product_id": "T051067"
}
},
{
"category": "product_version",
"name": "2026.2.22",
"product": {
"name": "Open Source OpenClaw 2026.2.22",
"product_id": "T051067-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openclaw:openclaw:2026.2.22"
}
}
}
],
"category": "product_name",
"name": "OpenClaw"
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-22168",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22168"
},
{
"cve": "CVE-2026-22169",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22169"
},
{
"cve": "CVE-2026-22170",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22170"
},
{
"cve": "CVE-2026-22174",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22174"
},
{
"cve": "CVE-2026-22177",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22177"
},
{
"cve": "CVE-2026-22179",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-22179"
},
{
"cve": "CVE-2026-27158",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27158"
},
{
"cve": "CVE-2026-27159",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27159"
},
{
"cve": "CVE-2026-27164",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27164"
},
{
"cve": "CVE-2026-27165",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27165"
},
{
"cve": "CVE-2026-27209",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27209"
},
{
"cve": "CVE-2026-27524",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27524"
},
{
"cve": "CVE-2026-27566",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-27566"
},
{
"cve": "CVE-2026-28455",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-28455"
},
{
"cve": "CVE-2026-29607",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-29607"
},
{
"cve": "CVE-2026-31994",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-31994"
},
{
"cve": "CVE-2026-31995",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-31995"
},
{
"cve": "CVE-2026-32000",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32000"
},
{
"cve": "CVE-2026-32003",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32003"
},
{
"cve": "CVE-2026-32008",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32008"
},
{
"cve": "CVE-2026-32010",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32010"
},
{
"cve": "CVE-2026-32017",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32017"
},
{
"cve": "CVE-2026-32018",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32018"
},
{
"cve": "CVE-2026-32019",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32019"
},
{
"cve": "CVE-2026-32020",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32020"
},
{
"cve": "CVE-2026-32022",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32022"
},
{
"cve": "CVE-2026-32024",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32024"
},
{
"cve": "CVE-2026-32029",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32029"
},
{
"cve": "CVE-2026-32030",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32030"
},
{
"cve": "CVE-2026-32032",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32032"
},
{
"cve": "CVE-2026-32034",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32034"
},
{
"cve": "CVE-2026-32039",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32039"
},
{
"cve": "CVE-2026-32045",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32045"
},
{
"cve": "CVE-2026-32046",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32046"
},
{
"cve": "CVE-2026-32049",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32049"
},
{
"cve": "CVE-2026-32056",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32056"
},
{
"cve": "CVE-2026-32061",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32061"
},
{
"cve": "CVE-2026-32062",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32062"
},
{
"cve": "CVE-2026-32063",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32063"
},
{
"cve": "CVE-2026-32064",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32064"
},
{
"cve": "CVE-2026-32896",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32896"
},
{
"cve": "CVE-2026-32897",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32897"
},
{
"cve": "CVE-2026-32900",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32900"
},
{
"cve": "CVE-2026-32907",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32907"
},
{
"cve": "CVE-2026-32908",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-32908"
},
{
"cve": "CVE-2026-3689",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-3689"
},
{
"cve": "CVE-2026-3690",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-3690"
},
{
"cve": "CVE-2026-4039",
"product_status": {
"known_affected": [
"T051067"
]
},
"release_date": "2026-02-22T23:00:00.000+00:00",
"title": "CVE-2026-4039"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.