Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5wcw-8jjv-m286 | OpenClaw: Untrusted web origins can obtain authenticated operator.admin access in trusted-proxy mode |
Tue, 24 Mar 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
Fri, 13 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Vendors & Products |
Openclaw
Openclaw openclaw |
Thu, 12 Mar 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untrusted origin could connect through a trusted reverse proxy, inherit proxy-authenticated identity, and establish a privileged operator session. This vulnerability is fixed in 2026.3.11. | |
| Title | OpenClaw: Untrusted web origins can obtain authenticated operator.admin access in trusted-proxy mode | |
| Weaknesses | CWE-346 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-13T13:11:06.707Z
Reserved: 2026-03-11T21:16:21.658Z
Link: CVE-2026-32302
Updated: 2026-03-13T13:11:03.128Z
Status : Analyzed
Published: 2026-03-13T19:54:41.650
Modified: 2026-03-24T21:36:21.617
Link: CVE-2026-32302
No data.
OpenCVE Enrichment
Updated: 2026-03-25T11:50:04Z
Github GHSA