CVE-2026-32034

OpenClaw versions prior to 2026.2.21 contain an authentication bypass vulnerability in the Control UI when allowInsecureAuth is explicitly enabled and the gateway is exposed over plaintext HTTP, allowing attackers to bypass device identity and pairing verification. An attacker with leaked or intercepted credentials can obtain high-privilege Control UI access by exploiting the lack of secure authentication enforcement over unencrypted HTTP connections.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

25 Mar 2026, 15:16

Type Values Removed Values Added
Summary
  • (es) Las versiones de OpenClaw anteriores a 2026.2.21 contienen una vulnerabilidad de omisión de autenticación en la interfaz de usuario de Control cuando allowInsecureAuth está explícitamente habilitado y la pasarela está expuesta a través de HTTP en texto plano, permitiendo a los atacantes omitir la identidad del dispositivo y la verificación de emparejamiento. Un atacante con credenciales filtradas o interceptadas puede obtener acceso de alto privilegio a la interfaz de usuario de Control al explotar la falta de aplicación de autenticación segura sobre conexiones HTTP no cifradas.
CVSS v2 : unknown
v3 : 6.8
v2 : unknown
v3 : 8.1

23 Mar 2026, 14:24

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/commit/40a292619e1f2be3a3b1db663d7494c9c2dc0abf - () https://github.com/openclaw/openclaw/commit/40a292619e1f2be3a3b1db663d7494c9c2dc0abf - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-3cvx-236h-m9fj - () https://github.com/openclaw/openclaw/security/advisories/GHSA-3cvx-236h-m9fj - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-insecure-control-ui-authentication-over-plaintext-http - () https://www.vulncheck.com/advisories/openclaw-insecure-control-ui-authentication-over-plaintext-http - Third Party Advisory

19 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 22:16

Updated : 2026-03-25 15:16


NVD link : CVE-2026-32034

Mitre link : CVE-2026-32034

CVE.ORG link : CVE-2026-32034


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')