CVE-2026-28472

8.1 HIGH

📋 TL;DR

OpenClaw versions before 2026.2.2 have an authentication bypass vulnerability in the WebSocket gateway connection handshake. Attackers can connect without proper device identity validation when an auth.token is present but not properly checked, potentially gaining operator access. This affects all deployments using vulnerable OpenClaw gateway software.

💻 Affected Systems

Products:
  • OpenClaw
Versions: All versions prior to 2026.2.2
Operating Systems: All platforms running OpenClaw
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using the vulnerable gateway component are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full operator access to the gateway, allowing them to control connected devices, intercept communications, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to the gateway leading to data exfiltration, device manipulation, and privilege escalation within the OpenClaw ecosystem.

🟢

If Mitigated

Limited impact with proper network segmentation and additional authentication layers, though the core vulnerability remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires only WebSocket access and a malformed auth.token to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.2.2

Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-rv39-79c4-7459

Restart Required: Yes

Instructions:

1. Download OpenClaw version 2026.2.2 or later from the official repository. 2. Stop the OpenClaw gateway service. 3. Replace the existing installation with the patched version. 4. Restart the OpenClaw gateway service.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict WebSocket gateway access to trusted networks only

iptables -A INPUT -p tcp --dport [WEBSOCKET_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [WEBSOCKET_PORT] -j DROP

WebSocket Proxy with Authentication

all

Place a reverse proxy with strong authentication in front of the OpenClaw gateway

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OpenClaw gateway from untrusted networks
  • Deploy a Web Application Firewall (WAF) with WebSocket protection rules in front of the gateway

🔍 How to Verify

Check if Vulnerable:

Check OpenClaw version: if version is less than 2026.2.2, the system is vulnerable

Check Version:

openclaw --version

Verify Fix Applied:

Verify OpenClaw version is 2026.2.2 or higher and test WebSocket connections with malformed auth.tokens are rejected

📡 Detection & Monitoring

Log Indicators:

  • WebSocket connection attempts with auth.token present but no device identity
  • Successful gateway connections without proper device pairing logs
  • Multiple failed authentication attempts followed by successful connection

Network Indicators:

  • WebSocket traffic to gateway port without preceding device pairing handshake
  • Unusual WebSocket connection patterns from unexpected sources

SIEM Query:

source="openclaw.log" AND ("websocket" AND "connect" AND NOT "device_identity")

🔗 References

📤 Share & Export