GHSA-48VW-M3QC-WR99: Improper Privilege Management in OpenClaw Gateway Trusted-Proxy Sessions
Vulnerability ID: GHSA-48VW-M3QC-WR99
CVSS Score: 9.8
Published: 2026-03-26
The OpenClaw gateway contains a privilege escalation vulnerability in its WebSocket connection logic when configured for trusted-proxy authentication. Client sessions claiming to be the Control UI over a trusted proxy connection retain self-declared administrative scopes without requiring a bound cryptographic device identity. This flaw permits an attacker capable of routing requests through the proxy to attain full administrative access to the gateway.
TL;DR
A flaw in OpenClaw's WebSocket handler allows an attacker to bypass scope scrubbing by spoofing the Control UI client ID over a trusted proxy connection, resulting in unauthenticated administrative access.
⚠️ Exploit Status: POC
Technical Details
- Vulnerability Type: Improper Privilege Management
- CWE ID: CWE-269, CWE-287
- CVSS Score: 9.8 (Critical)
- Attack Vector: Network
- Authentication Required: None
- Exploit Status: Proof of Concept Available
- Affected Component: WebSocket Message Handler
Affected Systems
- OpenClaw Gateway component
-
OpenClaw: < 2026.3.17 (Fixed in:
2026.3.17)
Code Analysis
Commit: ccf16cd
Fix: Scrub unbound scopes for trusted proxy auth connections
Exploit Details
- Regression Test PoC: Demonstrates forging the control-ui client ID and operator.admin scope over a mocked trusted proxy connection.
Mitigation Strategies
- Upgrade OpenClaw gateway software to version 2026.3.17 or later.
- Enforce strict header sanitization on all reverse proxies handling trusted-proxy authentication.
- Restrict the
gateway.controlUi.allowedOriginsparameter to specific administrative domains. - Monitor WebSocket logs for anomalous
control-uiclient connections lacking device pairing events.
Remediation Steps:
- Identify all deployed instances of the OpenClaw gateway.
- Determine if the instances utilize trusted-proxy authentication configurations.
- Pull the updated Docker image or binary for OpenClaw >= 2026.3.17.
- Deploy the updated software and restart the gateway services.
- Verify the patch application by monitoring the gateway service logs for stable operation.
- Review reverse proxy configurations to ensure inbound header stripping for
X-Forwarded-*values from untrusted sources.
References
- GitHub Advisory: GHSA-48VW-M3QC-WR99
- Fix Commit: ccf16cd8892402
- Aliyun Vulnerability Database: AVD-2026-1862837
Read the full report for GHSA-48VW-M3QC-WR99 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)