CVE-2026-32004

OpenClaw versions prior to 2026.3.2 contain an authentication bypass vulnerability in the /api/channels route classification due to canonicalization depth mismatch between auth-path classification and route-path canonicalization. Attackers can bypass plugin route authentication checks by submitting deeply encoded slash variants such as multi-encoded %2f to access protected /api/channels endpoints.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

23 Mar 2026, 19:12

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/commit/2fd8264ab03bd178e62a5f0c50d1c8556c17f12d - () https://github.com/openclaw/openclaw/commit/2fd8264ab03bd178e62a5f0c50d1c8556c17f12d - Patch
References () https://github.com/openclaw/openclaw/commit/7a7eee920a176a0043398c6b37bf4cc6eb983eeb - () https://github.com/openclaw/openclaw/commit/7a7eee920a176a0043398c6b37bf4cc6eb983eeb - Patch
References () https://github.com/openclaw/openclaw/commit/93b07240257919f770d1e263e1f22753937b80ea - () https://github.com/openclaw/openclaw/commit/93b07240257919f770d1e263e1f22753937b80ea - Patch
References () https://github.com/openclaw/openclaw/commit/d74bc257d8432f17e50b23ae713d7e0623a1fe0f - () https://github.com/openclaw/openclaw/commit/d74bc257d8432f17e50b23ae713d7e0623a1fe0f - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-v865-p3gq-hw6m - () https://github.com/openclaw/openclaw/security/advisories/GHSA-v865-p3gq-hw6m - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-authentication-bypass-via-encoded-path-in-api-channels-route - () https://www.vulncheck.com/advisories/openclaw-authentication-bypass-via-encoded-path-in-api-channels-route - Third Party Advisory
Summary
  • (es) Las versiones de OpenClaw anteriores a la 2026.3.2 contienen una vulnerabilidad de omisión de autenticación en la clasificación de ruta /api/channels debido a una falta de coincidencia en la profundidad de canonicalización entre la clasificación de la ruta de autenticación y la canonicalización de la ruta. Los atacantes pueden omitir las comprobaciones de autenticación de ruta del plugin al enviar variantes de barra profundamente codificadas, como %2f multi-codificado, para acceder a los puntos finales protegidos de /api/channels.

19 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 22:16

Updated : 2026-03-23 19:12


NVD link : CVE-2026-32004

Mitre link : CVE-2026-32004

CVE.ORG link : CVE-2026-32004


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel