OpenClaw before 2026.3.23 contains an authentication bypass vulnerability in the Canvas gateway where authorizeCanvasRequest() unconditionally allows local-direct requests without validating bearer tokens or canvas capabilities. Attackers can send unauthenticated loopback HTTP and WebSocket requests to Canvas routes to bypass authentication and gain unauthorized access.
References
Configurations
History
16 Apr 2026, 20:51
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87 - Patch | |
| References | () https://github.com/openclaw/openclaw/commit/d5dc6b6573ae489bc7e5651090f4767b93537c9e - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-6mqc-jqh6-x8fc - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-authentication-bypass-via-local-direct-requests-in-canvas-gateway - Third Party Advisory | |
| First Time |
Openclaw openclaw
Openclaw |
09 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 22:16
Updated : 2026-04-16 20:51
NVD link : CVE-2026-35634
Mitre link : CVE-2026-35634
CVE.ORG link : CVE-2026-35634
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
