GHSA-V6X2-2QVM-6GV8
Vulnerability from github – Published: 2026-03-03 23:01 – Updated: 2026-03-24 17:55
VLAI?
Summary
OpenClaw reuses the gateway auth token in the owner ID prompt hashing fallback
Details
Vulnerability
OpenClaw reused gateway.auth.token (and gateway.remote.token) as a fallback hash secret for owner-ID prompt obfuscation when commands.ownerDisplay=hash and commands.ownerDisplaySecret was unset.
This created secret dual-use between gateway authentication and prompt metadata hashing.
Impact
- Auth-secret dual-use across security domains (gateway auth and prompt metadata hashing).
- Hash outputs are visible to third-party model providers in system prompts.
- No direct plaintext token disclosure.
- Practical risk is highest when operators use weak gateway tokens and leave owner hash secret unset.
Affected Packages / Versions
- Package:
openclaw(npm) - Latest affected published version:
2026.2.21-2 - Vulnerable range:
<= 2026.2.21-2 - Patched version (planned next release):
2026.2.22
Affected Components
src/agents/cli-runner/helpers.tssrc/agents/pi-embedded-runner/run/attempt.tssrc/agents/pi-embedded-runner/compact.ts
Remediation
- Added a shared owner-display resolver and secret-generation helper.
- Removed fallback to
gateway.auth.tokenandgateway.remote.token. - Auto-generates and persists a dedicated
commands.ownerDisplaySecretwhen hash mode is enabled and secret is missing.
Fix Commit(s)
- c99e7696e6893083b256f0a6c88fb060f3a76fb7
Release Process Note
patched_versions is pre-set to the planned next release (2026.2.22). Once npm release 2026.2.22 is published, this advisory only needs to be published.
OpenClaw thanks @aether-ai-agent for reporting.
Severity ?
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 2026.2.21-2"
},
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2026.2.22"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-32897"
],
"database_specific": {
"cwe_ids": [
"CWE-522"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-03T23:01:30Z",
"nvd_published_at": null,
"severity": "LOW"
},
"details": "## Vulnerability\n\nOpenClaw reused `gateway.auth.token` (and `gateway.remote.token`) as a fallback hash secret for owner-ID prompt obfuscation when `commands.ownerDisplay=hash` and `commands.ownerDisplaySecret` was unset.\n\nThis created secret dual-use between gateway authentication and prompt metadata hashing.\n\n## Impact\n\n- Auth-secret dual-use across security domains (gateway auth and prompt metadata hashing).\n- Hash outputs are visible to third-party model providers in system prompts.\n- No direct plaintext token disclosure.\n- Practical risk is highest when operators use weak gateway tokens and leave owner hash secret unset.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Latest affected published version: `2026.2.21-2`\n- Vulnerable range: `\u003c= 2026.2.21-2`\n- Patched version (planned next release): `2026.2.22`\n\n## Affected Components\n\n- `src/agents/cli-runner/helpers.ts`\n- `src/agents/pi-embedded-runner/run/attempt.ts`\n- `src/agents/pi-embedded-runner/compact.ts`\n\n## Remediation\n\n- Added a shared owner-display resolver and secret-generation helper.\n- Removed fallback to `gateway.auth.token` and `gateway.remote.token`.\n- Auto-generates and persists a dedicated `commands.ownerDisplaySecret` when hash mode is enabled and secret is missing.\n\n## Fix Commit(s)\n\n- c99e7696e6893083b256f0a6c88fb060f3a76fb7\n\n## Release Process Note\n\n`patched_versions` is pre-set to the planned next release (`2026.2.22`). Once npm release `2026.2.22` is published, this advisory only needs to be published.\n\nOpenClaw thanks @aether-ai-agent for reporting.",
"id": "GHSA-v6x2-2qvm-6gv8",
"modified": "2026-03-24T17:55:00Z",
"published": "2026-03-03T23:01:30Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32897"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/c99e7696e6893083b256f0a6c88fb060f3a76fb7"
},
{
"type": "PACKAGE",
"url": "https://github.com/openclaw/openclaw"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openclaw-authentication-token-reuse-in-owner-id-prompt-hashing-fallback"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "OpenClaw reuses the gateway auth token in the owner ID prompt hashing fallback"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…