GHSA-CJV3-M589-V3RX: Authorization Bypass in OpenClaw Gateway via Shared-IP Fallback
Vulnerability ID: GHSA-CJV3-M589-V3RX
CVSS Score: 8.1
Published: 2026-03-03
A high-severity authorization bypass vulnerability exists in the OpenClaw Gateway component due to an insecure shared-IP fallback mechanism. In versions prior to 2026.2.22, the system implicitly trusted HTTP requests to sensitive 'Canvas' and 'A2UI' routes if the requester's IP address matched that of an active, authenticated Node WebSocket connection. This flaw allows attackers sharing a network environment (e.g., NAT, VPN, or corporate LAN) with a legitimate node to impersonate that node and access internal interfaces without authentication. The vulnerability is further exacerbated by weak proxy header handling, allowing potential exploitation via IP spoofing.
TL;DR
OpenClaw Gateway improperly trusted requests sharing an IP with authenticated nodes. Attackers on the same NAT/VPN or capable of IP spoofing could bypass auth to access sensitive AI interfaces.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-290
- Attack Vector: Network
- CVSS v3.1: 8.1 (High)
- Privileges Required: None
- Impact: Confidentiality & Integrity
- Exploit Status: PoC Available
Affected Systems
- OpenClaw Gateway
-
openclaw: < 2026.2.22 (Fixed in:
2026.2.22)
Code Analysis
Commit: c45f3c5
Implementation of capability tokens and removal of IP fallback
Refactor authorizeCanvasRequest to require capability tokens
Commit: 08a7967
Harden resolveGatewayClientIp to fail closed on untrusted proxies
Improve proxy header validation logic
Mitigation Strategies
- Upgrade to version 2026.2.22 or later immediately.
- Implement strict network segmentation to isolate Gateway traffic.
- Configure reverse proxies to strip client-supplied X-Forwarded-For headers.
Remediation Steps:
- Pull the latest Docker image or update the npm package:
npm install openclaw@latest. - Verify the version is >= 2026.2.22.
- Review
config.trustedProxiessettings in the OpenClaw configuration file. - Restart the OpenClaw Gateway service.
References
Read the full report for GHSA-CJV3-M589-V3RX on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)