CVE-2026-32057
HIGHOpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter
Title source: cnaDescription
OpenClaw versions prior to 2026.2.25 contain an authentication bypass vulnerability in the trusted-proxy Control UI pairing mechanism that accepts client.id=control-ui without proper device identity verification. An authenticated node role websocket client can exploit this by using the control-ui client identifier to skip pairing requirements and gain unauthorized access to node event execution flows.
Scores
CVSS v3
7.1
EPSS
0.0011
EPSS Percentile
29.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Details
CWE
CWE-807
Status
published
Products (4)
npm/openclaw
0 - 2026.2.25npm
OpenClaw/OpenClaw
< 2026.2.25
openclaw/openclaw
< 2026.2.25
OpenClaw/OpenClaw
2026.2.25
Published
Mar 21, 2026
Tracked Since
Mar 21, 2026