Description
OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSocket connect handshake in which it allows skipping device identity checks when auth.token is present but not validated. Attackers can connect to the gateway without providing device identity or pairing by exploiting the presence check instead of validation, potentially gaining operator access in vulnerable deployments.
Published: 2026-03-05
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized operator access via WebSocket
Action: Immediate Patch
AI Analysis

Impact

OpenClaw versions before 2026.2.2 suffer a flaw in the gateway WebSocket connect handshake that permits bypassing device identity verification when an auth.token is supplied but not validated. An attacker can exploit this gap to establish a connection to the gateway as if they were a properly paired device, thereby potentially gaining operator-level access in affected deployments. The weakness is an improper access control flaw classified as CWE-306.

Affected Systems

The affected product is OpenClaw, as provided by the vendor OpenClaw. The vulnerability impacts all OpenClaw releases lower than version 2026.2.2. No further sub‑version granularity is specified in the data.

Risk and Exploitability

The CVSS score of 9.2 marks this as a critical flaw. The EPSS score of less than 1% indicates that while the vulnerability is severe, the likelihood of exploitation in the wild is currently low. The vulnerability is not listed in CISA’s KEV catalog. Attackers can trigger the bypass by initiating a WebSocket connection to the gateway where an auth.token is present but not verified, suggesting that the attack vector is remote and can be performed over the network without additional pre‑conditions.

Generated by OpenCVE AI on April 16, 2026 at 11:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.2.2 or later to apply the vendor fix
  • Restrict incoming WebSocket connections to the gateway to trusted networks or enforce firewall rules to limit access until the patch can be applied
  • Verify that auth.token values are validated and that device identity checks are enforced; if a workaround is unavailable, block any WebSocket handshake that contains an auth.token without proper identity verification

Generated by OpenCVE AI on April 16, 2026 at 11:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rv39-79c4-7459 OpenClaw's gateway connect could skip device identity checks when auth.token was present but not yet validated
History

Mon, 09 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSocket connect handshake in which it allows skipping device identity checks when auth.token is present but not validated. Attackers can connect to the gateway without providing device identity or pairing by exploiting the presence check instead of validation, potentially gaining operator access in vulnerable deployments.
Title OpenClaw < 2026.2.2 - Device Identity Check Bypass in Gateway WebSocket Connect Handshake
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-306
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-09T18:04:49.892Z

Reserved: 2026-02-27T19:19:31.838Z

Link: CVE-2026-28472

cve-icon Vulnrichment

Updated: 2026-03-09T18:04:45.686Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T22:16:21.017

Modified: 2026-03-09T20:40:40.920

Link: CVE-2026-28472

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:00:11Z

Weaknesses