CVE-2026-35619

MEDIUM

OpenClaw < 2026.3.24 - Authorization Bypass via HTTP /v1/models Endpoint

Title source: cna

Description

OpenClaw before 2026.3.24 contains an authorization bypass vulnerability in the HTTP /v1/models endpoint that fails to enforce operator read scope requirements. Attackers with only operator.approvals scope can enumerate gateway model metadata through the HTTP compatibility route, bypassing the stricter WebSocket RPC authorization checks.

Scores

CVSS v3 4.3
EPSS 0.0003
EPSS Percentile 8.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Details

CWE
CWE-863
Status published
Products (4)
npm/openclaw 0 - 2026.3.24npm
OpenClaw/OpenClaw < 2026.3.24
openclaw/openclaw < 2026.3.24
OpenClaw/OpenClaw 2026.3.24
Published Apr 10, 2026
Tracked Since Apr 10, 2026