CVE-2026-35634
Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
09/04/2026
Last modified:
09/04/2026
Description
OpenClaw before 2026.3.23 contains an authentication bypass vulnerability in the Canvas gateway where authorizeCanvasRequest() unconditionally allows local-direct requests without validating bearer tokens or canvas capabilities. Attackers can send unauthenticated loopback HTTP and WebSocket requests to Canvas routes to bypass authentication and gain unauthorized access.
Impact
Base Score 4.0
5.10
Severity 4.0
MEDIUM
Base Score 3.x
5.10
Severity 3.x
MEDIUM
References to Advisories, Solutions, and Tools
- https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87
- https://github.com/openclaw/openclaw/commit/d5dc6b6573ae489bc7e5651090f4767b93537c9e
- https://github.com/openclaw/openclaw/security/advisories/GHSA-6mqc-jqh6-x8fc
- https://www.vulncheck.com/advisories/openclaw-authentication-bypass-via-local-direct-requests-in-canvas-gateway



