← Voltar para CVEs
CVE-2026-32001
MEDIUM5.4
Descricao
OpenClaw versions prior to 2026.2.22 contain an authentication bypass vulnerability that allows clients authenticated with a shared gateway token to connect as role=node without device identity verification. Attackers can exploit this by claiming the node role during WebSocket handshake to inject unauthorized node.event calls, triggering agent.request and voice.transcript flows without proper device pairing.
Detalhes CVE
Pontuacao CVSS v3.15.4
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado3/19/2026
Ultima modificacao3/23/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
openclaw:openclaw
Fraquezas (CWE)
CWE-863
Referencias
https://github.com/openclaw/openclaw/commit/ddcb2d79b17bf2a42c5037d8aeff1537a12b931e(disclosure@vulncheck.com)
https://github.com/openclaw/openclaw/security/advisories/GHSA-rv2q-f2h5-6xmg(disclosure@vulncheck.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.