OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts.
Attack Parameters
Attack Vector
Network
Атака возможна удалённо
Attack Complexity
Low
Легко эксплуатировать
Attack Requirements
Present
Нужны дополнительные условия
Privileges Required
None
Права не нужны
User Interaction
Active
Нужно действие пользователя
Impact Assessment
Confidentiality
High
Полная утечка данных
Integrity
Low
Частичная модификация данных
Availability
None
Нет нарушения работы
CVSS Vector v4.0
Weakness Type (CWE)
References 3
https://github.com/openclaw/openclaw/commit/a99ad11a4107ba8eac58f54a3c1a8a0cf56…
disclosure@vulncheck.com
https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj
disclosure@vulncheck.com
https://www.vulncheck.com/advisories/openclaw-oauth-state-validation-bypass-in-…
disclosure@vulncheck.com