CVE-2026-32057 PUBLISHED

OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter

Assigner: VulnCheck
Reserved: 10.03.2026 Published: 21.03.2026 Updated: 21.03.2026

OpenClaw versions prior to 2026.2.25 contain an authentication bypass vulnerability in the trusted-proxy Control UI pairing mechanism that accepts client.id=control-ui without proper device identity verification. An authenticated node role websocket client can exploit this by using the control-ui client identifier to skip pairing requirements and gain unauthorized access to node event execution flows.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.2.25 (excl.)
  • Version 2026.2.25 is unaffected

Credits

  • tdjackey reporter

References

Problem Types

  • CWE-807 Reliance on Untrusted Inputs in a Security Decision CWE