Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v6x2-2qvm-6gv8 | OpenClaw reuses the gateway auth token in the owner ID prompt hashing fallback |
Mon, 23 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.22 reuse gateway.auth.token as a fallback hash secret for owner-ID prompt obfuscation when commands.ownerDisplay is set to hash and commands.ownerDisplaySecret is unset, creating dual-use of authentication secrets across security domains. Attackers with access to system prompts sent to third-party model providers can derive the gateway authentication token from the hash outputs, compromising gateway authentication security. | |
| Title | OpenClaw < 2026.2.22 - Authentication Token Reuse in Owner ID Prompt Hashing Fallback | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-320 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T16:43:14.696Z
Reserved: 2026-03-16T21:18:44.711Z
Link: CVE-2026-32897
Updated: 2026-03-23T16:43:10.968Z
Status : Analyzed
Published: 2026-03-21T01:17:10.673
Modified: 2026-03-24T21:07:55.173
Link: CVE-2026-32897
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:42:48Z
Github GHSA