๐Ÿ” CVE Alert

CVE-2026-32057

HIGH 7.1

OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter

CVSS Score
7.1
EPSS Score
0.1%
EPSS Percentile
19th

OpenClaw versions prior to 2026.2.25 contain an authentication bypass vulnerability in the trusted-proxy Control UI pairing mechanism that accepts client.id=control-ui without proper device identity verification. An authenticated node role websocket client can exploit this by using the control-ui client identifier to skip pairing requirements and gain unauthorized access to node event execution flows.

CWE CWE-807
Vendor openclaw
Product openclaw
Published Mar 21, 2026
Last Updated Mar 25, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new high vulnerabilities affecting openclaw openclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None

Affected Versions

OpenClaw / OpenClaw
0 < 2026.2.25

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-vvgp-4c28-m3jm github.com: https://github.com/openclaw/openclaw/commit/ec45c317f5d0631a3d333b236da58c4749ede2a3 vulncheck.com: https://www.vulncheck.com/advisories/openclaw-authentication-bypass-via-control-ui-client-id-parameter

Credits

๐Ÿ” tdjackey