Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vvgp-4c28-m3jm | OpenClaw has a Trusted-proxy Control UI pairing bypass which allows unpaired node sessions |
Wed, 25 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 23 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.25 contain an authentication bypass vulnerability in the trusted-proxy Control UI pairing mechanism that accepts client.id=control-ui without proper device identity verification. An authenticated node role websocket client can exploit this by using the control-ui client identifier to skip pairing requirements and gain unauthorized access to node event execution flows. | |
| Title | OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-807 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-25T14:26:19.534Z
Reserved: 2026-03-10T19:48:47.516Z
Link: CVE-2026-32057
Updated: 2026-03-23T16:47:10.779Z
Status : Modified
Published: 2026-03-21T01:17:09.310
Modified: 2026-03-25T15:16:46.930
Link: CVE-2026-32057
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:44:12Z
Github GHSA