CVE-2026-32045

OpenClaw versions prior to 2026.2.21 incorrectly apply tokenless Tailscale header authentication to HTTP gateway routes, allowing bypass of token and password requirements. Attackers on trusted networks can exploit this misconfiguration to access HTTP gateway routes without proper authentication credentials.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

24 Mar 2026, 21:16

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/356d61aacfa5b0f1d5830716ec59d70682a3e7b8 - () https://github.com/openclaw/openclaw/commit/356d61aacfa5b0f1d5830716ec59d70682a3e7b8 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8 - Mitigation, Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-authentication-bypass-in-http-gateway-routes-via-tokenless-tailscale-auth - () https://www.vulncheck.com/advisories/openclaw-authentication-bypass-in-http-gateway-routes-via-tokenless-tailscale-auth - Third Party Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw

21 Mar 2026, 01:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-21 01:17

Updated : 2026-03-24 21:16


NVD link : CVE-2026-32045

Mitre link : CVE-2026-32045

CVE.ORG link : CVE-2026-32045


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-290

Authentication Bypass by Spoofing