GHSA-rv2q-f2h5-6xmg.yaml
1 info: 2 name: OpenClaw 3 cve: GHSA-rv2q-f2h5-6xmg 4 summary: OpenClaw Node role device-identity bypass allows unauthorized node.event injection 5 details: >- 6 Summary 7 8 A client authenticated with a shared gateway token could connect as role=node without device identity/pairing, then call 9 node.event to trigger agent.request and voice.transcript flows. 10 11 12 Affected Packages / Versions 13 14 - Package: npm openclaw 15 16 - Affected versions: <= 2026.2.21-2 17 18 - Patched version: 2026.2.22 (planned next release) 19 20 21 Details 22 23 The WebSocket connect path allowed device-less bypass whenever shared auth succeeded. That bypass did not restrict role, 24 so a client could claim role=node with no device identity and still pass handshake auth. Because node.event is node-role 25 allowed, this enabled unauthorized node event injection into agent-trigger flows. 26 27 28 Impact 29 30 Unauthorized node.event injection can trigger agent execution and voice transcript flows for clients that only hold the 31 shared gateway token, without node device pairing. 32 33 34 Remediation 35 36 Upgrade to 2026.2.22 (or newer) once published. The fix requires device identity for role=node connects, even when shared-token 37 auth succeeds. 38 cvss: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N 39 severity: MEDIUM 40 security_advise: Upgrade openclaw to >= 2026.2.22 or later. Commit(s) - ddcb2d79b17bf2a42c5037d8aeff1537a12b931e 41 references: 42 - https://github.com/openclaw/openclaw/security/advisories/GHSA-rv2q-f2h5-6xmg 43 rule: version <= "2026.2.21-2" 44 references: 45 - https://github.com/openclaw/openclaw/security/advisories/GHSA-rv2q-f2h5-6xmg