Description
OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of configured webhook passwords. When the gateway operates behind a reverse proxy, unauthenticated remote attackers can inject arbitrary BlueBubbles message and reaction events by reaching the proxy endpoint.
Published: 2026-03-05
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass in OpenClaw webhook endpoint
Action: Patch Immediately
AI Analysis

Impact

OpenClaw versions earlier than 2026.2.12 contain a flaw in the optional BlueBubbles webhook handler that authenticates requests solely on the loopback remoteAddress. Because the handler does not validate proxy‑provided forwarding headers, an attacker can send a request that appears to originate from 127.0.0.1, bypassing the configured webhook password. The result is unauthorized injection of BlueBubbles message and reaction events, allowing the attacker to post arbitrary content through the webhook endpoint.

Affected Systems

OpenClaw is the vendor and product; all releases before 2026.2.12 are affected. Any deployment that uses the BlueBubbles plugin and runs behind a reverse proxy is exposed.

Risk and Exploitability

The CVSS score of 8.2 indicates high severity, while the EPSS score of less than 1% suggests a low probability of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. The attack vector is network‑remote; an external attacker who can reach the reverse‑proxy front‑end can craft a request that the backend treats as loopback, thereby bypassing authentication. Once authenticated, the attacker can inject arbitrary message events, compromising data integrity and potentially enabling social‑engineering or spam attacks.

Generated by OpenCVE AI on April 16, 2026 at 11:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.2.12 or newer, which removes the loopback authentication flaw.
  • If an upgrade is not immediately possible, disable or remove the BlueBubbles plugin until a patched version is available.
  • Reconfigure any reverse proxy to reject requests that contain loopback or local addresses in forwarded headers, or strip the X‑Forwarded‑For header before it reaches OpenClaw.
  • Ensure that webhook endpoints require a valid password or token and that the server validates authentication headers properly.

Generated by OpenCVE AI on April 16, 2026 at 11:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xc7w-v5x6-cc87 OpenClaw has a webhook auth bypass when gateway is behind a reverse proxy (loopback remoteAddress trust)
History

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of configured webhook passwords. When the gateway operates behind a reverse proxy, unauthenticated remote attackers can inject arbitrary BlueBubbles message and reaction events by reaching the proxy endpoint.
Title OpenClaw < 2026.2.12 - Webhook Authentication Bypass via Loopback remoteAddress Trust
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-306
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-09T18:17:13.779Z

Reserved: 2026-03-04T16:16:15.968Z

Link: CVE-2026-29613

cve-icon Vulnrichment

Updated: 2026-03-09T18:17:09.388Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T22:16:24.850

Modified: 2026-03-11T00:43:15.910

Link: CVE-2026-29613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:00:11Z

Weaknesses