Skip to content

Commit 3ee5514

Browse files
1 parent c33c6d3 commit 3ee5514

2 files changed

Lines changed: 32 additions & 7 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-3cvx-236h-m9fj/GHSA-3cvx-236h-m9fj.json

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3cvx-236h-m9fj",
4-
"modified": "2026-03-19T22:28:21Z",
4+
"modified": "2026-03-25T18:45:34Z",
55
"published": "2026-03-03T21:49:18Z",
66
"aliases": [
77
"CVE-2026-32034"
88
],
99
"summary": "OpenClaw has an opt-in insecure Control UI auth over plaintext HTTP could allow privileged access",
1010
"details": "## Description\n\nIn affected releases, when an operator explicitly enabled `gateway.controlUi.allowInsecureAuth: true` and exposed the gateway over plaintext HTTP, Control UI authentication could permit privileged operator access without the intended device identity + pairing guarantees.\n\nThis required an insecure deployment choice and credential exposure risk (for example, plaintext transit or prior token leak). It was fixed on `main` in commit `40a292619e1f2be3a3b1db663d7494c9c2dc0abf` ([PR #20684](https://github.com/openclaw/openclaw/pull/20684)).\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected published versions: `<= 2026.2.19-2`\n- Planned patched version: `2026.2.21`\n\n## Impact\n\nIn these explicitly insecure deployments, an attacker with leaked/intercepted credentials could obtain high-privilege Control UI access.\n\n## Fix Commit(s)\n\n- `40a292619e1f2be3a3b1db663d7494c9c2dc0abf` (merged 2026-02-20)\n\nOpenClaw thanks @Vasco0x4 for reporting.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
@@ -43,6 +47,10 @@
4347
"type": "WEB",
4448
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3cvx-236h-m9fj"
4549
},
50+
{
51+
"type": "ADVISORY",
52+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32034"
53+
},
4654
{
4755
"type": "WEB",
4856
"url": "https://github.com/openclaw/openclaw/pull/20684"
@@ -54,16 +62,21 @@
5462
{
5563
"type": "PACKAGE",
5664
"url": "https://github.com/openclaw/openclaw"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://www.vulncheck.com/advisories/openclaw-insecure-control-ui-authentication-over-plaintext-http"
5769
}
5870
],
5971
"database_specific": {
6072
"cwe_ids": [
6173
"CWE-285",
62-
"CWE-319"
74+
"CWE-319",
75+
"CWE-78"
6376
],
6477
"severity": "MODERATE",
6578
"github_reviewed": true,
6679
"github_reviewed_at": "2026-03-03T21:49:18Z",
67-
"nvd_published_at": null
80+
"nvd_published_at": "2026-03-19T22:16:39Z"
6881
}
6982
}

advisories/github-reviewed/2026/03/GHSA-f8mp-vj46-cq8v/GHSA-f8mp-vj46-cq8v.json

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f8mp-vj46-cq8v",
4-
"modified": "2026-03-19T22:27:42Z",
4+
"modified": "2026-03-25T18:44:27Z",
55
"published": "2026-03-03T19:52:45Z",
66
"aliases": [
77
"CVE-2026-32032"
@@ -11,7 +11,11 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,23 +44,31 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-f8mp-vj46-cq8v"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32032"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/25e89cc86338ef475d26be043aa541dfdb95e52a"
4654
},
4755
{
4856
"type": "PACKAGE",
4957
"url": "https://github.com/openclaw/openclaw"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.vulncheck.com/advisories/openclaw-arbitrary-shell-execution-via-unvalidated-shell-environment-variable"
5062
}
5163
],
5264
"database_specific": {
5365
"cwe_ids": [
5466
"CWE-426",
5567
"CWE-78"
5668
],
57-
"severity": "MODERATE",
69+
"severity": "HIGH",
5870
"github_reviewed": true,
5971
"github_reviewed_at": "2026-03-03T19:52:45Z",
60-
"nvd_published_at": null
72+
"nvd_published_at": "2026-03-19T22:16:38Z"
6173
}
6274
}

0 commit comments

Comments
 (0)