LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-28472

CVE-2026-28472 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 5, 2026

OpenClaw - Authentication Bypass

Published: March 5, 2026Updated: March 5, 2026Remote Exploitable

Overview

OpenClaw < 2026.2.2 contains an authentication bypass caused by skipping device identity checks when auth.token is present but not validated in the gateway WebSocket connect handshake, letting attackers gain operator access without device identity or pairing.

Severity & Score

Severity: Critical
CVSS Score: 9.8

Impact

Attackers can gain operator access without device identity or pairing, potentially controlling the gateway.

Mitigation

Update to version 2026.2.2 or later.

Details

CVE ID
CVE-2026-28472
Severity
Critical
CVSS Score
9.8
Type
broken_authentication
Status
new

CWE

  • CWE-306

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H