Impact
OpenClaw allows a browser‑originated WebSocket connection to bypass origin validation when gateway.auth.mode is set to trusted‑proxy and the request carries proxy headers. A page served from an untrusted origin can therefore inherit the proxy‑authenticated identity and start an operator.admin session. The attacker gains full control over the OpenClaw instance, compromising confidentiality, integrity and availability. This weakness is identified as CWE‑346.
Affected Systems
The vulnerability affects the OpenClaw personal AI assistant (openclaw:openclaw) running on Node.js. All releases prior to 2026.3.11 that use gateway.auth.mode set to trusted‑proxy are vulnerable. No narrower version list is supplied beyond the release that contains the fix.
Risk and Exploitability
With a CVSS score of 8.1 the issue is high severity, yet the EPSS score is below 1 % and it is not listed in the CISA KEV catalog, implying a low probability of widespread exploitation. The attack requires only a malicious web page hosted on an untrusted origin that can reach the reverse proxy; the exploitation path is straightforward once the configuration is in place.
OpenCVE Enrichment
Github GHSA