CVE-2026-32031

OpenClaw versions prior to 2026.2.26 server-http contains an authentication bypass vulnerability in gateway authentication for plugin channel endpoints due to path canonicalization mismatch between the gateway guard and plugin handler routing. Attackers can bypass authentication by sending requests with alternative path encodings to access protected plugin channel APIs without proper gateway authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

23 Mar 2026, 15:05

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-8j2w-6fmm-m587 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-8j2w-6fmm-m587 - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-authentication-bypass-via-path-canonicalization-mismatch-in-api-channels-gateway - () https://www.vulncheck.com/advisories/openclaw-authentication-bypass-via-path-canonicalization-mismatch-in-api-channels-gateway - Third Party Advisory
First Time Openclaw openclaw
Openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

19 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 22:16

Updated : 2026-03-23 15:05


NVD link : CVE-2026-32031

Mitre link : CVE-2026-32031

CVE.ORG link : CVE-2026-32031


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel