CVE-2026-32025

HIGH

OpenClaw < 2026.2.25 - Password Brute-Force via Browser-Origin WebSocket Authentication Bypass

Title source: cna
STIX 2.1

Description

OpenClaw versions prior to 2026.2.25 contain an authentication hardening gap in browser-origin WebSocket clients that allows attackers to bypass origin checks and auth throttling on loopback deployments. An attacker can trick a user into opening a malicious webpage and perform password brute-force attacks against the gateway to establish an authenticated operator session and invoke control-plane methods.

Scores

CVSS v3 7.5
EPSS 0.0009
EPSS Percentile 25.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-307
Status published
Products (3)
npm/openclaw 0 - 2026.2.25npm
OpenClaw/OpenClaw < 2026.2.25
OpenClaw/OpenClaw 2026.2.25
Published Mar 19, 2026
Tracked Since Mar 20, 2026