CVE-2026-22172 PUBLISHED

OpenClaw < 2026.3.12 - Scope Elevation in WebSocket Shared-Auth Connections

Assigner: VulnCheck
Reserved: 06.01.2026 Published: 20.03.2026 Updated: 20.03.2026

OpenClaw versions prior to 2026.3.12 contain an authorization bypass vulnerability in the WebSocket connect path that allows shared-token or password-authenticated connections to self-declare elevated scopes without server-side binding. Attackers can exploit this logic flaw to present unauthorized scopes such as operator.admin and perform admin-only gateway operations.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9.4

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.3.12 (excl.)
  • Version 2026.3.12 is unaffected

Credits

  • Yekai Chen (@LUOYEcode) reporter

References

Problem Types

  • CWE-862 Missing Authorization CWE