CVE-2026-32031
⚪ Do wiadomości
Obejście uwierzytelnienia w OpenClaw umożliwia dostęp do chronionych API kanałów wtyczek bez odpowiedniej autoryzacji.
CVSS
4.8
EPSS
0.1%
Exploit
none
Vendor
openclaw
Opis źródłowy (NVD)
OpenClaw versions prior to 2026.2.26 server-http contains an authentication bypass vulnerability in gateway authentication for plugin channel endpoints due to path canonicalization mismatch between the gateway guard and plugin handler routing. Attackers can bypass authentication by sending requests with alternative path encodings to access protected plugin channel APIs without proper gateway authentication.
auth-bypass
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 4.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-03-19 22:16:38 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-23 15:05:47 UTC |
Referencje
- https://github.com/openclaw/openclaw/security/advisories/GHSA-8j2w-6fmm-m587 (disclosure@vulncheck.com) [Vendor Advisory]
- https://www.vulncheck.com/advisories/openclaw-authentication-bypass-via-path-canonicalization-mismatch-in-api-channels-gateway (disclosure@vulncheck.com) [Third Party Advisory]