CVE-2026-35619
MEDIUMOpenClaw < 2026.3.24 - Authorization Bypass via HTTP /v1/models Endpoint
Title source: cnaDescription
OpenClaw before 2026.3.24 contains an authorization bypass vulnerability in the HTTP /v1/models endpoint that fails to enforce operator read scope requirements. Attackers with only operator.approvals scope can enumerate gateway model metadata through the HTTP compatibility route, bypassing the stricter WebSocket RPC authorization checks.
Scores
CVSS v3
4.3
EPSS
0.0003
EPSS Percentile
8.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Details
CWE
CWE-863
Status
published
Products (4)
npm/openclaw
0 - 2026.3.24npm
OpenClaw/OpenClaw
< 2026.3.24
openclaw/openclaw
< 2026.3.24
OpenClaw/OpenClaw
2026.3.24
Published
Apr 10, 2026
Tracked Since
Apr 10, 2026