CVE-2026-32041

OpenClaw versions prior to 2026.3.1 fail to properly handle authentication bootstrap errors during startup, allowing browser-control routes to remain accessible without authentication. Local processes or loopback-reachable SSRF paths can exploit this to access browser-control routes including evaluate-capable actions without valid credentials.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

23 Mar 2026, 17:29

Type Values Removed Values Added
Summary
  • (es) Las versiones de OpenClaw anteriores a la 2026.3.1 no gestionan correctamente los errores de arranque de autenticación durante el inicio, permitiendo que las rutas de control del navegador permanezcan accesibles sin autenticación. Los procesos locales o las rutas SSRF accesibles a través de loopback pueden explotar esto para acceder a rutas de control del navegador, incluidas acciones con capacidad de evaluación, sin credenciales válidas.
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-vpj2-69hf-rppw - () https://github.com/openclaw/openclaw/security/advisories/GHSA-vpj2-69hf-rppw - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-unauthenticated-browser-control-access-via-failed-auth-bootstrap - () https://www.vulncheck.com/advisories/openclaw-unauthenticated-browser-control-access-via-failed-auth-bootstrap - Third Party Advisory
First Time Openclaw openclaw
Openclaw

19 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 22:16

Updated : 2026-03-23 17:29


NVD link : CVE-2026-32041

Mitre link : CVE-2026-32041

CVE.ORG link : CVE-2026-32041


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-306

Missing Authentication for Critical Function