-
-
Notifications
You must be signed in to change notification settings - Fork 18.3k
Open
Labels
1.severity: securityIssues which raise a security issue, or PRs that fix oneIssues which raise a security issue, or PRs that fix one
Description
- CVE-2026-32302
- Nixpkgs security tracker issue
- affected package maintainers: cc @chrisportela
Description
OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untrusted origin could connect through a trusted reverse proxy, inherit proxy-authenticated identity, and establish a privileged operator session. This vulnerability is fixed in 2026.3.11.
CVSS CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
- CVSS version: 3.1
- Attack Vector (AV): Network (N)
- Attack Complexity (AC): Low (L)
- Privileges Required (PR): None (N)
- User Interaction (UI): Required (R)
- Scope (S): Unchanged (U)
- Confidentiality (C): High (H)
- Integrity (I): High (H)
- Availability (A): None (N)
Affected packages
openclaw(2026.2.26@nixos-unstable)
Additional comment
Upstream advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-5wcw-8jjv-m286
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
1.severity: securityIssues which raise a security issue, or PRs that fix oneIssues which raise a security issue, or PRs that fix one