Description
OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identity on the trusted network can spoof reconnect metadata to bypass platform-based node command policies and gain access to restricted commands.
Published: 2026-03-19
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access to Restricted Commands via Metadata Spoofing
Action: Apply Patch
AI Analysis

Impact

OpenClaw versions before 2026.2.26 allow a client to send reconnect metadata containing "platform" and "deviceFamily" fields that are not incorporated into the device‑authentication signature. Because these fields are not signed, an attacker who already owns a paired node identity on the trusted network can spoof the metadata to impersonate a different platform. This manipulation bypasses platform‑based node command policies, enabling the attacker to execute commands that would normally be restricted for that platform. The vulnerability is categorized as a CWE-290 (Authentication) weakness and presents a high potential for privilege escalation within the trusted network.

Affected Systems

All OpenClaw products (OpenClaw:OpenClaw) with versions earlier than 2026.2.26 are affected. No additional version data was supplied. The affected platform can be identified using the provided CPE string: cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been publicly exploited. Attack conditions require an attacker to have a valid, paired node identity within the trusted network, meaning the threat is primarily internal or requires the adversary to gain access to the network first. If that condition is met, they can easily spoof the metadata and bypass the intended command restrictions. The risk is therefore significant for environments that rely on platform‑based command gating, and mitigation should be performed promptly.

Generated by OpenCVE AI on March 19, 2026 at 23:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch to upgrade OpenClaw to version 2026.2.26 or later, as described in the vendor’s GitHub advisories and security update commit.

Generated by OpenCVE AI on March 19, 2026 at 23:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-r65x-2hqr-j5hf OpenClaw: Node reconnect metadata spoofing could bypass platform-based node command policy
History

Fri, 20 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identity on the trusted network can spoof reconnect metadata to bypass platform-based node command policies and gain access to restricted commands.
Title OpenClaw < 2026.2.26 - Node Reconnect Metadata Spoofing via Unsigned Platform Fields
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-290
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-20T20:12:32.183Z

Reserved: 2026-03-10T19:48:38.210Z

Link: CVE-2026-32014

cve-icon Vulnrichment

Updated: 2026-03-20T20:12:28.802Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T22:16:34.610

Modified: 2026-03-23T19:09:38.927

Link: CVE-2026-32014

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T11:05:31Z

Weaknesses