CVE-2026-28472
HIGHOpenClaw <2026.2.2 - Auth Bypass
Title source: llmDescription
OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSocket connect handshake in which it allows skipping device identity checks when auth.token is present but not validated. Attackers can connect to the gateway without providing device identity or pairing by exploiting the presence check instead of validation, potentially gaining operator access in vulnerable deployments.
Scores
CVSS v3
8.1
EPSS
0.0004
EPSS Percentile
11.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-306
Status
published
Affected Products (1)
openclaw/openclaw
< 2026.2.2
Timeline
Published
Mar 05, 2026
Tracked Since
Mar 06, 2026