OpenClaw versions prior to 2026.2.21 incorrectly apply tokenless Tailscale header authentication to HTTP gateway routes, allowing bypass of token and password requirements. Attackers on trusted networks can exploit this misconfiguration to access HTTP gateway routes without proper authentication credentials.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/commit/356d61aacfa5b0f1d5830716ec59d70682a3e7b8 | Patch |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-hff7-ccv5-52f8 | Mitigation Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-authentication-bypass-in-http-gateway-routes-via-tokenless-tailscale-auth | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-21 01:17
Updated : 2026-03-24 21:16
NVD link : CVE-2026-32045
Mitre link : CVE-2026-32045
CVE.ORG link : CVE-2026-32045
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-290
Authentication Bypass by Spoofing
