CVE-2026-32057
Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
21/03/2026
Last modified:
25/03/2026
Description
OpenClaw versions prior to 2026.2.25 contain an authentication bypass vulnerability in the trusted-proxy Control UI pairing mechanism that accepts client.id=control-ui without proper device identity verification. An authenticated node role websocket client can exploit this by using the control-ui client identifier to skip pairing requirements and gain unauthorized access to node event execution flows.
Impact
Base Score 4.0
6.00
Severity 4.0
MEDIUM
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | 2026.2.25 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



