Impact
OpenClaw versions before 2026.2.14 permit an attacker to bypass OAuth state validation in the manual Chutes login flow. By tricking a user into pasting attacker‑controlled OAuth callback data, the attack circumvents CSRF protection, allowing credential substitution and the persistence of access tokens for unauthorized accounts. The flaw enables an attacker to cause the victim to authenticate as an account controlled by the attacker without the victim’s knowledge.
Affected Systems
The affected product is OpenClaw by OpenClaw. Any installation running a version earlier than 2026.2.14 is vulnerable.
Risk and Exploitability
The CVSS base score of 5.9 indicates a medium‑severity risk, and the EPSS score of less than 1% suggests a low probability of exploitation. It is not listed in the CISA KEV catalog. The likely attack path requires the victim to be convinced to paste a malicious OAuth callback URL into the browser, after which the server accepts the tampered authentication data and issues valid tokens. Because the vulnerability depends on user interaction, the attack is opportunistic and may be difficult to execute widely, but the impact of a successful abuse is significant due to unauthorized account access.
OpenCVE Enrichment
Github GHSA