GHSA-rqpp-rjj8-7wv8: Privilege Escalation via WebSocket Authorization Bypass in OpenClaw
Vulnerability ID: GHSA-X49Q-FHHM-R9JF
CVSS Score: 9.9
Published: 2026-03-20
A logic flaw in the OpenClaw gateway WebSocket connection handler permits clients authenticating with shared tokens to self-declare and retain elevated administrative scopes. This vulnerability allows an attacker possessing a low-privileged shared secret to bypass intended device-identity boundaries and execute administrative RPC commands against the gateway.
TL;DR
OpenClaw gateway versions up to 2026.3.11 fail to strip client-declared scopes during WebSocket initialization if the client provides a valid shared token. This grants administrative access (e.g., operator.admin) to deviceless connections without server-side validation.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-269
- Attack Vector: Network
- CVSS Score: 9.9 (Critical)
- Exploit Status: Proof of Concept
- Authentication Required: Low (Shared Token)
- User Interaction: None
Affected Systems
- OpenClaw Gateway
- OpenClaw WebSocket Server
-
openclaw: <= 2026.3.11 (Fixed in:
2026.3.12)
Code Analysis
Commit: 5e389d5
Fix client-declared scopes for shared-token operator connects
Mitigation Strategies
- Upgrade the openclaw npm package to version 2026.3.12 or later.
- Rotate all existing shared authentication tokens to invalidate compromised credentials.
- Implement strict network segmentation to restrict access to the OpenClaw WebSocket endpoint.
Remediation Steps:
- Identify all deployments utilizing the
openclawnpm package in the environment. - Update the package dependencies in
package.jsonto requireopenclaw@^2026.3.12. - Rebuild and deploy the gateway application.
- Verify the update by executing the provided regression test payload against a staging instance.
- Rotate shared tokens used by existing deviceless clients.
References
- Primary Advisory: GHSA-rqpp-rjj8-7wv8
- Withdrawn Duplicate Advisory: GHSA-X49Q-FHHM-R9JF
- Fix Commit 5e389d5e7c9233ec91026ab2fea299ebaf3249f6
- OpenClaw Pull Request #44306
- OpenClaw Release Notes v2026.3.12
Read the full report for GHSA-X49Q-FHHM-R9JF on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)