Description
OpenClaw versions prior to 2026.2.21 BlueBubbles webhook handler contains a passwordless fallback authentication path that allows unauthenticated webhook events in certain reverse-proxy or local routing configurations. Attackers can bypass webhook authentication by exploiting the loopback/proxy heuristics to send unauthenticated webhook events to the BlueBubbles plugin.
Published: 2026-03-21
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized webhook execution via passwordless fallback
Action: Patch
AI Analysis

Impact

The BlueBubbles plugin in OpenClaw processes webhook events without requiring credentials when the request is routed through a loopback or reverse‑proxy path. This passwordless fallback allows an attacker to trigger privileged plugin logic by sending an unauthenticated webhook request, potentially executing code that is otherwise restricted to authenticated calls.

Affected Systems

All OpenClaw installations running a Node.js‑based version earlier than 2026.2.21 that include the BlueBubbles plugin are vulnerable. The vulnerability applies to environments where the application trusts requests from the local host or a reverse‑proxy, such as reverse‑proxy or local routing configurations.

Risk and Exploitability

The assigned CVSS score of 6.3 indicates moderate severity. No EPSS score is available, and the issue is not listed in the CISA KEV catalog, implying limited known exploitation. The likely attack vector requires the attacker to be able to reach the OpenClaw server through a misconfigured reverse‑proxy or local routing path that the application accepts without authentication, allowing the delivery of an unauthenticated webhook event to the BlueBubbles endpoint.

Generated by OpenCVE AI on March 21, 2026 at 08:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch by upgrading OpenClaw to version 2026.2.21 or later.
  • Verify that your reverse‑proxy or local‑routing configuration does not permit loopback or internal requests to reach the BlueBubbles webhook endpoint without authentication.
  • If an immediate upgrade is not feasible, restrict external access to the BlueBubbles webhook route until the vulnerability is remediated.

Generated by OpenCVE AI on March 21, 2026 at 08:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5mx2-2mgw-x8rm OpenClaw: BlueBubbles beta plugin webhook auth hardening (remove passwordless fallback)
History

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.21 BlueBubbles webhook handler contains a passwordless fallback authentication path that allows unauthenticated webhook events in certain reverse-proxy or local routing configurations. Attackers can bypass webhook authentication by exploiting the loopback/proxy heuristics to send unauthenticated webhook events to the BlueBubbles plugin.
Title OpenClaw < 2026.2.21 - Unauthenticated Webhook Access via Passwordless Fallback in BlueBubbles Plugin
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-306
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-23T16:55:52.767Z

Reserved: 2026-03-16T21:18:44.711Z

Link: CVE-2026-32896

cve-icon Vulnrichment

Updated: 2026-03-23T16:47:24.786Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-21T01:17:10.510

Modified: 2026-03-23T19:45:52.377

Link: CVE-2026-32896

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:42:49Z

Weaknesses