Impact
OpenClaw versions before 2026.2.2 suffer a flaw in the gateway WebSocket connect handshake that permits bypassing device identity verification when an auth.token is supplied but not validated. An attacker can exploit this gap to establish a connection to the gateway as if they were a properly paired device, thereby potentially gaining operator-level access in affected deployments. The weakness is an improper access control flaw classified as CWE-306.
Affected Systems
The affected product is OpenClaw, as provided by the vendor OpenClaw. The vulnerability impacts all OpenClaw releases lower than version 2026.2.2. No further sub‑version granularity is specified in the data.
Risk and Exploitability
The CVSS score of 9.2 marks this as a critical flaw. The EPSS score of less than 1% indicates that while the vulnerability is severe, the likelihood of exploitation in the wild is currently low. The vulnerability is not listed in CISA’s KEV catalog. Attackers can trigger the bypass by initiating a WebSocket connection to the gateway where an auth.token is present but not verified, suggesting that the attack vector is remote and can be performed over the network without additional pre‑conditions.
OpenCVE Enrichment
Github GHSA