← Volver a CVEs
CVE-2026-35619
MEDIUM4.3
Descripcion
OpenClaw before 2026.3.24 contains an authorization bypass vulnerability in the HTTP /v1/models endpoint that fails to enforce operator read scope requirements. Attackers with only operator.approvals scope can enumerate gateway model metadata through the HTTP compatibility route, bypassing the stricter WebSocket RPC authorization checks.
Detalles CVE
Puntuacion CVSS v3.14.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado4/10/2026
Ultima modificacion4/10/2026
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-863
Referencias
https://github.com/openclaw/openclaw/commit/06de515b6c42816b62ec752e1c221cab67b38501(disclosure@vulncheck.com)
https://github.com/openclaw/openclaw/security/advisories/GHSA-68f8-9mhj-h2mp(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/openclaw-authorization-bypass-via-http-v1-models-endpoint(disclosure@vulncheck.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.