Impact
The vulnerability is an authentication bypass located in the remote onboarding component of OpenClaw. Attackers can create spoofed discovery endpoints that redirect the onboarding process toward malicious gateways, allowing the capture of gateway credentials or intercepted traffic. The flaw leads to credential theft and potential unauthorized access to the system, representing a significant breach of confidentiality and integrity. This weakness is classified as CWE-346, indicating broken authentication.
Affected Systems
OpenClaw versions prior to 2026.3.28 are affected. The issue is present in the OpenClaw product built on Node.js; only releases before the 2026.3.28 update are susceptible.
Risk and Exploitability
The CVSS score of 7.4 denotes high severity, while the EPSS score of less than 1% indicates that, at present, exploitation is unlikely but still possible in the wild. The vulnerability is not listed in CISA's KEV catalog. Attackers can exploit the flaw remotely by sending forged discovery requests to the target without needing valid credentials, leveraging the authentication bypass in the onboarding flow to exfiltrate credentials.
OpenCVE Enrichment
Github GHSA