CVE-2026-32057

OpenClaw versions prior to 2026.2.25 contain an authentication bypass vulnerability in the trusted-proxy Control UI pairing mechanism that accepts client.id=control-ui without proper device identity verification. An authenticated node role websocket client can exploit this by using the control-ui client identifier to skip pairing requirements and gain unauthorized access to node event execution flows.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

25 Mar 2026, 15:16

Type Values Removed Values Added
Summary
  • (es) Las versiones de OpenClaw anteriores a 2026.2.25 contienen una vulnerabilidad de omisión de autenticación en el mecanismo de emparejamiento de la interfaz de usuario de control del proxy de confianza que acepta client.id=control-ui sin la verificación adecuada de la identidad del dispositivo. Un cliente websocket con rol de nodo autenticado puede explotar esto utilizando el identificador de cliente control-ui para omitir los requisitos de emparejamiento y obtener acceso no autorizado a los flujos de ejecución de eventos del nodo.
CVSS v2 : unknown
v3 : 5.9
v2 : unknown
v3 : 7.1

24 Mar 2026, 21:10

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/commit/ec45c317f5d0631a3d333b236da58c4749ede2a3 - () https://github.com/openclaw/openclaw/commit/ec45c317f5d0631a3d333b236da58c4749ede2a3 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-vvgp-4c28-m3jm - () https://github.com/openclaw/openclaw/security/advisories/GHSA-vvgp-4c28-m3jm - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-authentication-bypass-via-control-ui-client-id-parameter - () https://www.vulncheck.com/advisories/openclaw-authentication-bypass-via-control-ui-client-id-parameter - Third Party Advisory

21 Mar 2026, 01:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-21 01:17

Updated : 2026-03-25 15:16


NVD link : CVE-2026-32057

Mitre link : CVE-2026-32057

CVE.ORG link : CVE-2026-32057


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-807

Reliance on Untrusted Inputs in a Security Decision