CVE-2026-32302 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: March 13, 2026
OpenClaw - Authentication Bypass
Overview
OpenClaw prior to 2026.3.11 contains an authentication bypass caused by origin validation bypass in WebSocket connections with trusted-proxy mode and proxy headers, letting attackers from untrusted origins establish privileged operator sessions, exploit requires gateway.auth.mode set to trusted-proxy and proxy headers.
Severity & Score
Impact
Attackers can establish privileged operator sessions, leading to unauthorized access and control.
Mitigation
Update to version 2026.3.11 or later.
References
Social Media Activity(2 posts)
š CVE-2026-32302 - High (8.1) OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untr... š https://www.thehackerwire.com/vulnerability/CVE-2026-32302/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-32302 - High (8.1) OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untr... š https://www.thehackerwire.com/vulnerability/CVE-2026-32302/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-32302
- Severity
- High
- CVSS Score
- 8.1
- Type
- broken_authentication
- Status
- new
- EPSS
- 1.5%
- Social Posts
- 2
CWE
- CWE-346
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N