๐Ÿ” CVE Alert

CVE-2026-32302

HIGH 8.1

OpenClaw: Untrusted web origins can obtain authenticated operator.admin access in trusted-proxy mode

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untrusted origin could connect through a trusted reverse proxy, inherit proxy-authenticated identity, and establish a privileged operator session. This vulnerability is fixed in 2026.3.11.

CWE CWE-346
Vendor openclaw
Product openclaw
Published Mar 12, 2026
Last Updated Mar 13, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new high vulnerabilities affecting openclaw openclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

openclaw / openclaw
< 2026.3.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-5wcw-8jjv-m286 github.com: https://github.com/openclaw/openclaw/commit/ebed3bbde1a72a1aaa9b87b63b91e7c04a50036b github.com: https://github.com/openclaw/openclaw/releases/tag/v2026.3.11