/ data / vuln_en / openclaw / GHSA-rv2q-f2h5-6xmg.yaml
GHSA-rv2q-f2h5-6xmg.yaml
 1  info:
 2    name: OpenClaw
 3    cve: GHSA-rv2q-f2h5-6xmg
 4    summary: OpenClaw Node role device-identity bypass allows unauthorized node.event injection
 5    details: >-
 6      Summary
 7  
 8      A client authenticated with a shared gateway token could connect as role=node without device identity/pairing, then call
 9      node.event to trigger agent.request and voice.transcript flows.
10  
11  
12      Affected Packages / Versions
13  
14      - Package: npm openclaw
15  
16      - Affected versions: <= 2026.2.21-2
17  
18      - Patched version: 2026.2.22 (planned next release)
19  
20  
21      Details
22  
23      The WebSocket connect path allowed device-less bypass whenever shared auth succeeded. That bypass did not restrict role,
24      so a client could claim role=node with no device identity and still pass handshake auth. Because node.event is node-role
25      allowed, this enabled unauthorized node event injection into agent-trigger flows.
26  
27  
28      Impact
29  
30      Unauthorized node.event injection can trigger agent execution and voice transcript flows for clients that only hold the
31      shared gateway token, without node device pairing.
32  
33  
34      Remediation
35  
36      Upgrade to 2026.2.22 (or newer) once published. The fix requires device identity for role=node connects, even when shared-token
37      auth succeeds.
38    cvss: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
39    severity: MEDIUM
40    security_advise: Upgrade openclaw to >= 2026.2.22 or later. Commit(s) - ddcb2d79b17bf2a42c5037d8aeff1537a12b931e
41    references:
42    - https://github.com/openclaw/openclaw/security/advisories/GHSA-rv2q-f2h5-6xmg
43  rule: version <= "2026.2.21-2"
44  references:
45  - https://github.com/openclaw/openclaw/security/advisories/GHSA-rv2q-f2h5-6xmg