OpenClaw versions prior to 2026.2.21 contain an authentication bypass vulnerability in the Control UI when allowInsecureAuth is explicitly enabled and the gateway is exposed over plaintext HTTP, allowing attackers to bypass device identity and pairing verification. An attacker with leaked or intercepted credentials can obtain high-privilege Control UI access by exploiting the lack of secure authentication enforcement over unencrypted HTTP connections.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3cvx-236h-m9fj | OpenClaw has an opt-in insecure Control UI auth over plaintext HTTP could allow privileged access |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 19 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.21 contain an authentication bypass vulnerability in the Control UI when allowInsecureAuth is explicitly enabled and the gateway is exposed over plaintext HTTP, allowing attackers to bypass device identity and pairing verification. An attacker with leaked or intercepted credentials can obtain high-privilege Control UI access by exploiting the lack of secure authentication enforcement over unencrypted HTTP connections. | |
| Title | OpenClaw < 2026.2.21 - Insecure Control UI Authentication over Plaintext HTTP | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-19T22:07:09.339Z
Reserved: 2026-03-10T19:48:43.187Z
Link: CVE-2026-32034
No data.
Status : Received
Published: 2026-03-19T22:16:39.167
Modified: 2026-03-19T22:16:39.167
Link: CVE-2026-32034
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA