Description
OpenClaw before 2026.3.11 contains a credential fallback vulnerability where unavailable local gateway.auth.token and gateway.auth.password SecretRefs are treated as unset, allowing fallback to remote credentials in local mode. Attackers can exploit misconfigured local auth references to cause CLI and helper paths to select incorrect credential sources, potentially bypassing intended local authentication boundaries.
Published: 2026-03-31
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Credential bypass via fallback logic
Action: Update immediately
AI Analysis

Impact

OpenClaw versions earlier than 2026.3.11 contain a flaw that treats unavailable local gateway.auth.token and gateway.auth.password references as unset, causing the application to revert to remote credentials even when operating in local mode. This improper authentication enforcement means that the command line interface and auxiliary processes can unintentionally pick a different credential source, allowing an attacker to bypass the intended local authentication boundary. The weakness is classified as CWE‑636, representing a failure to enforce the correct authentication policy.

Affected Systems

All deployments of OpenClaw that rely on the local gateway authentication mechanism are potentially affected. Any installation running a release prior to 2026.3.11 and using gateway.auth.token or gateway.auth.password SecretRefs is at risk. The issue is independent of operating system or hosting environment and applies to all standard configurations of the software.

Risk and Exploitability

The vulnerability scores low with a CVSS base of 2 and no EPSS data is available, and it is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker needs local system access or the ability to modify the local authentication references to exploit the fallback logic. The exploit does not provide remote code execution but can lead to unauthorized use of credential information and compromise the isolation between local and remote authentication mechanisms. Consequently, the risk is considered low to moderate, with the primary concern being credential misuse rather than system compromise.

Generated by OpenCVE AI on March 31, 2026 at 12:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.3.11 or newer
  • Verify that gateway.auth.token and gateway.auth.password SecretRefs are correctly configured and not left unavailable
  • If a patch cannot be applied immediately, restrict or disable remote credential fallback when running in local mode and limit CLI access to trusted users
  • Monitor authentication logs for unexpected credential usage

Generated by OpenCVE AI on March 31, 2026 at 12:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 11:45:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.11 contains a credential fallback vulnerability where unavailable local gateway.auth.token and gateway.auth.password SecretRefs are treated as unset, allowing fallback to remote credentials in local mode. Attackers can exploit misconfigured local auth references to cause CLI and helper paths to select incorrect credential sources, potentially bypassing intended local authentication boundaries.
Title OpenClaw < 2026.3.11 - Credential Fallback Logic Bypass via Unavailable Local Auth SecretRefs
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-636
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 2.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-31T13:58:43.881Z

Reserved: 2026-03-17T11:31:33.583Z

Link: CVE-2026-32970

cve-icon Vulnrichment

Updated: 2026-03-31T13:58:25.427Z

cve-icon NVD

Status : Received

Published: 2026-03-31T12:16:29.113

Modified: 2026-03-31T12:16:29.113

Link: CVE-2026-32970

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:39:07Z

Weaknesses