PT-2026-26739 · Openclaw · Openclaw
Tdjackey
·
Published
2026-03-21
·
Updated
2026-03-21
·
CVE-2026-32057
CVSS v3.1
5.9
Medium
| AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N |
OpenClaw versions prior to 2026.2.25 contain an authentication bypass vulnerability in the trusted-proxy Control UI pairing mechanism that accepts client.id=control-ui without proper device identity verification. An authenticated node role websocket client can exploit this by using the control-ui client identifier to skip pairing requirements and gain unauthorized access to node event execution flows.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw