Ad

CVE-2026-32302

HIGH CVSS 3.1: 8.1 EPSS 0.02%
Updated Mar 24, 2026
Openclaw
Parameter Value
CVSS 8.1 (HIGH)
Affected Versions before 2026.3.11
Fixed In 2026.3.11
Type CWE-346 (Origin Validation Error)
Vendor Openclaw
Public PoC No

OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untrusted origin could connect through a trusted reverse proxy, inherit proxy-authenticated identity, and establish a privileged operator session.

This vulnerability is fixed in 2026.3.11.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Openclaw Openclaw
cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
2026.3.11