GHSA-VVJH-F6P9-5VCF
Vulnerability from github – Published: 2026-03-04 19:17 – Updated: 2026-03-04 19:17ZDI-CAN-29311: OpenClaw Canvas Authentication Bypass Vulnerability
-- ABSTRACT -------------------------------------
Trend Micro's Zero Day Initiative has identified a vulnerability affecting the following products: OpenClaw - OpenClaw
-- VULNERABILITY DETAILS ------------------------ * Version tested: openclaw 2026.2.17 * Platform tested: macOS 26.3
Analysis
Description
The OpenClaw gateway's authorizeCanvasRequest() function implements an IP-based authentication fallback for canvas endpoints (/__openclaw__/a2ui/, /__openclaw__/canvas/, /__openclaw__/ws). When a WebSocket client authenticates from a private IP address, ALL subsequent HTTP requests from that same IP are granted canvas access without requiring their own authentication token.
In environments where multiple clients share a single IP address ��� corporate NAT, VPN concentrators, Kubernetes clusters, Docker host-mode networking ��� an unauthenticated attacker on the same network is granted full canvas access by virtue of sharing an IP with a legitimate authenticated client.
Root Cause
Three functions in src/gateway/server-http.ts create this vulnerability:
1. IP-matching function (line ~100)
function hasAuthorizedWsClientForIp(clients: Set<GatewayWsClient>, clientIp: string): boolean {
for (const client of clients) {
if (client.clientIp && client.clientIp === clientIp) {
return true;
}
}
return false;
}
This function checks if ANY connected WebSocket client shares the same IP. It does not verify that the HTTP request belongs to the same user, session, or browser as the WS client.
2. IP-based fallback in authorizeCanvasRequest (line ~109)
async function authorizeCanvasRequest(params: { ... }): Promise<GatewayAuthResult> {
// ... token check first ...
const clientIp = resolveGatewayClientIp({ ... });
// Only allow fallback for private/loopback addresses
if (!isPrivateOrLoopbackAddress(clientIp)) {
return lastAuthFailure ?? { ok: false, reason: "unauthorized" };
}
// THE VULNERABILITY: grants access based on IP alone
if (hasAuthorizedWsClientForIp(clients, clientIp)) {
return { ok: true };
}
return lastAuthFailure ?? { ok: false, reason: "unauthorized" };
}
If the HTTP request comes from a private IP that matches any authenticated WS client, access is granted without verifying the request's own credentials.
3. Canvas path routing
function isCanvasPath(pathname: string): boolean {
return (
pathname === A2UI_PATH || // /__openclaw__/a2ui
pathname.startsWith(`${A2UI_PATH}/`) ||
pathname === CANVAS_HOST_PATH || // /__openclaw__/canvas
pathname.startsWith(`${CANVAS_HOST_PATH}/`) ||
pathname === CANVAS_WS_PATH // /__openclaw__/ws
);
}
All canvas endpoints use this weaker authentication path instead of the standard authorizeGatewayConnect() which requires a valid token.
Attack Scenario
Corporate NAT Environment
- A company runs an OpenClaw gateway on an internal server with
--bind lanand a token for authentication. - Developer Alice connects her OpenClaw desktop app via WebSocket using her valid token. The gateway records her IP as the corporate NAT address (e.g.,
10.0.0.1). - Attacker Bob, on the same corporate network, also appears as
10.0.0.1to the gateway (NAT). - Bob sends an HTTP request to
http://gateway:18789/__openclaw__/a2ui/with NO authentication header. authorizeCanvasRequest()checks: Is10.0.0.1a private IP? Yes. Is there a WS client from10.0.0.1? Yes (Alice). Access granted.- Bob now has full access to all canvas endpoints ��� the A2UI interface, canvas content, and the canvas WebSocket ��� without ever authenticating.
Kubernetes / Docker Environments
In containerized deployments using shared networking (host mode, pod networking), multiple containers share the same IP. One container's authentication enables canvas access for all containers on that IP.
Reproduction Steps
Prerequisites
- Docker installed
- Python 3
- OpenClaw Docker image built as
openclaw:local
Steps
-
Navigate to the PoC directory and start the environment:
bash cd vulnerabilities/04-canvas-ip-auth-bypass docker compose up -d --wait -
This starts two containers on a shared Docker network:
- Gateway (172.28.0.10): Token-protected OpenClaw gateway
-
Legitimate client (172.28.0.20): Connects via WebSocket with valid token, establishing IP trust
-
Wait a few seconds for the legitimate client to authenticate, then run the PoC:
bash python3 poc.py -
The PoC runs three tests:
| Test | Source | Source IP | Token | Result |
|---|---|---|---|---|
| 1 ��� Host (different IP) | Host machine | Host bridge IP | None | 401 Unauthorized |
| 2 ��� Host with token (control) | Host machine | Host bridge IP | Valid | 200 OK |
| 3 ��� Same IP (exploit) | docker exec into legit container | 172.28.0.20 | None | 200 OK |
-
Test 3 is the exploit:
poc.pyusesdocker execto run an HTTP request from inside the legitimate client's container (IP 172.28.0.20) with noAuthorizationheader. The gateway'sauthorizeCanvasRequest()matches the source IP against the authenticated WebSocket client and returns200 OK��� granting full canvas access without credentials. -
Cleanup:
bash docker compose down -v
Impact
- Authentication Bypass: Any unauthenticated client sharing an IP with a legitimate WS-authenticated client gains full canvas endpoint access.
- Information Disclosure: Canvas endpoints serve:
- The A2UI (Agent-to-User Interface) rendered content, which may contain sensitive data the AI agent is presenting to the user
- The canvas HTML/JS application
- The canvas WebSocket upgrade endpoint
- Scope: Affects all deployments where the gateway is network-exposed (
--bind lan) and clients share IP addresses (NAT, VPN, K8s, corporate networks). - No auth required: The attacker needs only network adjacency; no credentials, tokens, or user interaction.
-- CREDIT --------------------------------------- This vulnerability was discovered by: Peter Girnus (@gothburz) and Project AESIR of TrendAI Zero Day Initiative
-- FURTHER DETAILS ------------------------------
Supporting files: ZDI-CAN-29311.zip
If supporting files were contained with this report they are provided within a password protected ZIP file. The password is the ZDI candidate number in the form: ZDI-CAN-XXXX where XXXX is the ID number.
Zero Day Initiative zdi-disclosures@trendmicro.com
The PGP key used for all ZDI vendor communications is available from:
http://www.zerodayinitiative.com/documents/disclosures-pgp-key.asc
-- INFORMATION ABOUT THE ZDI -------------------- Established by TippingPoint and acquired by Trend Micro, the Zero Day Initiative (ZDI) neither re-sells vulnerability details nor exploit code. Instead, upon notifying the affected product vendor, the ZDI provides its Trend Micro TippingPoint customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available.
Please contactZero Day Initiative for further details or refer to:
http://www.zerodayinitiative.com
-- DISCLOSURE POLICY ----------------------------
Zero Day Initiative's vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
Fix Commit(s)
c45f3c5b004c8d63dc0e282e2176f8c9355d24f1
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2026.2.19"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-291"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-04T19:17:36Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "ZDI-CAN-29311: OpenClaw Canvas Authentication Bypass Vulnerability\n\n-- ABSTRACT -------------------------------------\n\nTrend Micro\u0027s Zero Day Initiative has identified a vulnerability affecting the following products:\nOpenClaw - OpenClaw\n\n-- VULNERABILITY DETAILS ------------------------\n* Version tested: openclaw 2026.2.17\n* Platform tested: macOS 26.3\n\n---\n\n### Analysis\n\n## Description\n\nThe OpenClaw gateway\u0027s `authorizeCanvasRequest()` function implements an IP-based authentication fallback for canvas endpoints (`/__openclaw__/a2ui/`, `/__openclaw__/canvas/`, `/__openclaw__/ws`). When a WebSocket client authenticates from a private IP address, ALL subsequent HTTP requests from that same IP are granted canvas access without requiring their own authentication token.\n\nIn environments where multiple clients share a single IP address \ufffd\ufffd\ufffd corporate NAT, VPN concentrators, Kubernetes clusters, Docker host-mode networking \ufffd\ufffd\ufffd an unauthenticated attacker on the same network is granted full canvas access by virtue of sharing an IP with a legitimate authenticated client.\n\n## Root Cause\n\nThree functions in `src/gateway/server-http.ts` create this vulnerability:\n\n### 1. IP-matching function (line ~100)\n\n```typescript\nfunction hasAuthorizedWsClientForIp(clients: Set\u003cGatewayWsClient\u003e, clientIp: string): boolean {\n for (const client of clients) {\n if (client.clientIp \u0026\u0026 client.clientIp === clientIp) {\n return true;\n }\n }\n return false;\n}\n```\n\nThis function checks if ANY connected WebSocket client shares the same IP. It does not verify that the HTTP request belongs to the same user, session, or browser as the WS client.\n\n### 2. IP-based fallback in authorizeCanvasRequest (line ~109)\n\n```typescript\nasync function authorizeCanvasRequest(params: { ... }): Promise\u003cGatewayAuthResult\u003e {\n // ... token check first ...\n\n const clientIp = resolveGatewayClientIp({ ... });\n\n // Only allow fallback for private/loopback addresses\n if (!isPrivateOrLoopbackAddress(clientIp)) {\n return lastAuthFailure ?? { ok: false, reason: \"unauthorized\" };\n }\n\n // THE VULNERABILITY: grants access based on IP alone\n if (hasAuthorizedWsClientForIp(clients, clientIp)) {\n return { ok: true };\n }\n\n return lastAuthFailure ?? { ok: false, reason: \"unauthorized\" };\n}\n```\n\nIf the HTTP request comes from a private IP that matches any authenticated WS client, access is granted without verifying the request\u0027s own credentials.\n\n### 3. Canvas path routing\n\n```typescript\nfunction isCanvasPath(pathname: string): boolean {\n return (\n pathname === A2UI_PATH || // /__openclaw__/a2ui\n pathname.startsWith(`${A2UI_PATH}/`) ||\n pathname === CANVAS_HOST_PATH || // /__openclaw__/canvas\n pathname.startsWith(`${CANVAS_HOST_PATH}/`) ||\n pathname === CANVAS_WS_PATH // /__openclaw__/ws\n );\n}\n```\n\nAll canvas endpoints use this weaker authentication path instead of the standard `authorizeGatewayConnect()` which requires a valid token.\n\n## Attack Scenario\n\n### Corporate NAT Environment\n\n1. A company runs an OpenClaw gateway on an internal server with `--bind lan` and a token for authentication.\n2. Developer Alice connects her OpenClaw desktop app via WebSocket using her valid token. The gateway records her IP as the corporate NAT address (e.g., `10.0.0.1`).\n3. Attacker Bob, on the same corporate network, also appears as `10.0.0.1` to the gateway (NAT).\n4. Bob sends an HTTP request to `http://gateway:18789/__openclaw__/a2ui/` with NO authentication header.\n5. `authorizeCanvasRequest()` checks: Is `10.0.0.1` a private IP? Yes. Is there a WS client from `10.0.0.1`? Yes (Alice). Access granted.\n6. Bob now has full access to all canvas endpoints \ufffd\ufffd\ufffd the A2UI interface, canvas content, and the canvas WebSocket \ufffd\ufffd\ufffd without ever authenticating.\n\n### Kubernetes / Docker Environments\n\nIn containerized deployments using shared networking (host mode, pod networking), multiple containers share the same IP. One container\u0027s authentication enables canvas access for all containers on that IP.\n\n## Reproduction Steps\n\n### Prerequisites\n- Docker installed\n- Python 3\n- OpenClaw Docker image built as `openclaw:local`\n\n### Steps\n\n1. Navigate to the PoC directory and start the environment:\n ```bash\n cd vulnerabilities/04-canvas-ip-auth-bypass\n docker compose up -d --wait\n ```\n\n2. This starts two containers on a shared Docker network:\n - **Gateway** (172.28.0.10): Token-protected OpenClaw gateway\n - **Legitimate client** (172.28.0.20): Connects via WebSocket with valid token, establishing IP trust\n\n3. Wait a few seconds for the legitimate client to authenticate, then run the PoC:\n ```bash\n python3 poc.py\n ```\n\n4. The PoC runs three tests:\n\n | Test | Source | Source IP | Token | Result |\n |------|--------|-----------|-------|--------|\n | 1 \ufffd\ufffd\ufffd Host (different IP) | Host machine | Host bridge IP | None | **401 Unauthorized** |\n | 2 \ufffd\ufffd\ufffd Host with token (control) | Host machine | Host bridge IP | Valid | **200 OK** |\n | 3 \ufffd\ufffd\ufffd **Same IP (exploit)** | **docker exec into legit container** | **172.28.0.20** | **None** | **200 OK** |\n\n5. Test 3 is the exploit: `poc.py` uses `docker exec` to run an HTTP request from inside the legitimate client\u0027s container (IP 172.28.0.20) with **no** `Authorization` header. The gateway\u0027s `authorizeCanvasRequest()` matches the source IP against the authenticated WebSocket client and returns `200 OK` \ufffd\ufffd\ufffd granting full canvas access without credentials.\n\n6. Cleanup:\n ```bash\n docker compose down -v\n ```\n\n## Impact\n\n- **Authentication Bypass**: Any unauthenticated client sharing an IP with a legitimate WS-authenticated client gains full canvas endpoint access.\n- **Information Disclosure**: Canvas endpoints serve:\n - The A2UI (Agent-to-User Interface) rendered content, which may contain sensitive data the AI agent is presenting to the user\n - The canvas HTML/JS application\n - The canvas WebSocket upgrade endpoint\n- **Scope**: Affects all deployments where the gateway is network-exposed (`--bind lan`) and clients share IP addresses (NAT, VPN, K8s, corporate networks).\n- **No auth required**: The attacker needs only network adjacency; no credentials, tokens, or user interaction.\n\n\n\n-- CREDIT ---------------------------------------\nThis vulnerability was discovered by:\nPeter Girnus (@gothburz) and Project AESIR of TrendAI Zero Day Initiative\n\n-- FURTHER DETAILS ------------------------------\n\nSupporting files: \n[ZDI-CAN-29311.zip](https://github.com/user-attachments/files/25445235/ZDI-CAN-29311.zip)\n\n\nIf supporting files were contained with this report they are provided within a password protected ZIP file. The password is the ZDI candidate number in the form: ZDI-CAN-XXXX where XXXX is the ID number.\n\nZero Day Initiative\nzdi-disclosures@trendmicro.com\n\nThe PGP key used for all ZDI vendor communications is available from:\n\n http://www.zerodayinitiative.com/documents/disclosures-pgp-key.asc\n\n-- INFORMATION ABOUT THE ZDI --------------------\nEstablished by TippingPoint and acquired by Trend Micro, the Zero Day Initiative (ZDI) neither re-sells vulnerability details nor exploit code. Instead, upon notifying the affected product vendor, the ZDI provides its Trend Micro TippingPoint customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available.\n\nPlease contactZero Day Initiative for further details or refer to:\n\n http://www.zerodayinitiative.com\n\n-- DISCLOSURE POLICY ----------------------------\n\nZero Day Initiative\u0027s vulnerability disclosure policy is available online at:\n\n http://www.zerodayinitiative.com/advisories/disclosure_policy/\n \n\n## Fix Commit(s)\n- `c45f3c5b004c8d63dc0e282e2176f8c9355d24f1`",
"id": "GHSA-vvjh-f6p9-5vcf",
"modified": "2026-03-04T19:17:36Z",
"published": "2026-03-04T19:17:36Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vvjh-f6p9-5vcf"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/c45f3c5b004c8d63dc0e282e2176f8c9355d24f1"
},
{
"type": "PACKAGE",
"url": "https://github.com/openclaw/openclaw"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "OpenClaw Canvas Authentication Bypass Vulnerability"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.