OpenClaw versions prior to 2026.2.25 contain an authentication hardening gap in browser-origin WebSocket clients that allows attackers to bypass origin checks and auth throttling on loopback deployments. An attacker can trick a user into opening a malicious webpage and perform password brute-force attacks against the gateway to establish an authenticated operator session and invoke control-plane methods.
References
Configurations
History
23 Mar 2026, 17:12
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://github.com/openclaw/openclaw/commit/c736f11a16d6bc27ea62a0fe40fffae4cb071fdb - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-jmmg-jqc7-5qf4 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-password-brute-force-via-browser-origin-websocket-authentication-bypass - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
19 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 22:16
Updated : 2026-03-23 17:12
NVD link : CVE-2026-32025
Mitre link : CVE-2026-32025
CVE.ORG link : CVE-2026-32025
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
