๐Ÿ” CVE Alert

CVE-2026-32004

MEDIUM 6.5

OpenClaw < 2026.3.2 - Authentication Bypass via Encoded Path in /api/channels Route

CVSS Score
6.5
EPSS Score
0.1%
EPSS Percentile
16th

OpenClaw versions prior to 2026.3.2 contain an authentication bypass vulnerability in the /api/channels route classification due to canonicalization depth mismatch between auth-path classification and route-path canonicalization. Attackers can bypass plugin route authentication checks by submitting deeply encoded slash variants such as multi-encoded %2f to access protected /api/channels endpoints.

CWE CWE-288
Vendor openclaw
Product openclaw
Published Mar 19, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new medium vulnerabilities affecting openclaw openclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None

Affected Versions

OpenClaw / OpenClaw
0 < 2026.3.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-v865-p3gq-hw6m github.com: https://github.com/openclaw/openclaw/commit/93b07240257919f770d1e263e1f22753937b80ea github.com: https://github.com/openclaw/openclaw/commit/2fd8264ab03bd178e62a5f0c50d1c8556c17f12d github.com: https://github.com/openclaw/openclaw/commit/d74bc257d8432f17e50b23ae713d7e0623a1fe0f github.com: https://github.com/openclaw/openclaw/commit/7a7eee920a176a0043398c6b37bf4cc6eb983eeb vulncheck.com: https://www.vulncheck.com/advisories/openclaw-authentication-bypass-via-encoded-path-in-api-channels-route

Credits

๐Ÿ” tdjackey