Description
OpenClaw versions prior to 2026.3.12 contain an authorization bypass vulnerability in the WebSocket connect path that allows shared-token or password-authenticated connections to self-declare elevated scopes without server-side binding. Attackers can exploit this logic flaw to present unauthorized scopes such as operator.admin and perform admin-only gateway operations.
Published: 2026-03-20
Score: 9.4 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in OpenClaw allows an attacker to use a WebSocket shared‑token or password‑authenticated connection to declare elevated authorization scopes that are not bound by the server. The attacker can therefore request scopes such as operator.admin and perform privileged gateway operations normally restricted to administrators. This flaw results in a loss of integrity and a severe compromise of the system’s control plane because an unauthorized user can effectively elevate their privileges within the OpenClaw environment.

Affected Systems

All installations of the OpenClaw software with a version older than 2026.3.12 are affected. This includes typically web‑application and API services that rely on the WebSocket connection path for authentication. The flaw is present in the OpenClaw product itself and may involve Node.js components in the same code base. Users running any 2026.3.11 or earlier release should consider their installations at risk.

Risk and Exploitability

The flaw is rated as CVSS 9.4, indicating a very high severity. The EPSS score is below 1%, suggesting a low estimated exploitation probability, and the vulnerability is not yet listed in the CISA KEV catalog. The likely attack vector is a remote WebSocket connection that an attacker can forge or interpose on an unsuspecting client. Once the connection is established, the attacker can cause the server to grant administrative scopes without proper validation. Given the high impact and the remote nature of the exploit, organizations should treat this as a critical risk pending mitigation.

Generated by OpenCVE AI on March 24, 2026 at 22:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OpenClaw 2026.3.12 or any later release that fixes the WebSocket shared‑auth scope elevation flaw.

Generated by OpenCVE AI on March 24, 2026 at 22:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rqpp-rjj8-7wv8 OpenClaw: WebSocket shared-auth connections could self-declare elevated scopes
History

Tue, 24 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

Fri, 20 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 15:15:00 +0000


Fri, 20 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.3.12 contain an authorization bypass vulnerability in the WebSocket connect path that allows shared-token or password-authenticated connections to self-declare elevated scopes without server-side binding. Attackers can exploit this logic flaw to present unauthorized scopes such as operator.admin and perform admin-only gateway operations.
Title OpenClaw < 2026.3.12 - Scope Elevation in WebSocket Shared-Auth Connections
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-862
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:*:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-20T18:06:50.224Z

Reserved: 2026-01-06T16:47:17.180Z

Link: CVE-2026-22172

cve-icon Vulnrichment

Updated: 2026-03-20T18:03:45.757Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T15:16:15.490

Modified: 2026-03-24T21:20:45.707

Link: CVE-2026-22172

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:29:20Z

Weaknesses