๐Ÿ” CVE Alert

CVE-2026-32036

MEDIUM 6.5

OpenClaw < 2026.2.26- Authentication Bypass via Encoded Dot-Segment Traversal in /api/channels

CVSS Score
6.5
EPSS Score
0.1%
EPSS Percentile
18th

OpenClaw gateway plugin versions prior to 2026.2.26 contain a path traversal vulnerability that allows remote attackers to bypass route authentication checks by manipulating /api/channels paths with encoded dot-segment traversal sequences. Attackers can craft alternate paths using encoded traversal patterns to access protected plugin channel routes when handlers normalize the incoming path, circumventing security controls.

CWE CWE-289
Vendor openclaw
Product openclaw
Published Mar 19, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new medium vulnerabilities affecting openclaw openclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None

Affected Versions

OpenClaw / OpenClaw
0 < 2026.2.26

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-mwxv-35wr-4vvj github.com: https://github.com/openclaw/openclaw/commit/258d615c45527ffda37cecd08cd268f97461bde0 vulncheck.com: https://www.vulncheck.com/advisories/openclaw-authentication-bypass-via-encoded-dot-segment-traversal-in-api-channels

Credits

๐Ÿ” Peng Zhou (@zpbrent)