GHSA-cjv3-m589-v3rx

Suggest an improvement
Source
https://github.com/advisories/GHSA-cjv3-m589-v3rx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-cjv3-m589-v3rx/GHSA-cjv3-m589-v3rx.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-cjv3-m589-v3rx
Downstream
Published
2026-03-03T23:17:06Z
Modified
2026-03-04T15:14:04.950421Z
Severity
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N CVSS Calculator
Summary
OpenClaw has Canvas route hardening for mixed-trust deployments
Details

Summary

This advisory tracks a defense-in-depth hardening for canvas routes. In mixed-trust or network-visible deployments, prior canvas auth/fallback behavior could broaden access beyond intended boundaries.

Deployment Context

OpenClaw’s default model is trusted host + loopback-first access. Some operators intentionally expose canvas routes on LAN/tailnet. This update is aimed at those broader deployment patterns.

What Changed

  • Require explicit token or session-capability authorization for canvas routes.
  • Remove shared-IP fallback paths for canvas access.
  • Tighten bind/fallback behavior to fail closed.

Impact

Risk was highest in non-loopback or mixed-trust environments. In strict single-operator trusted-host setups, practical exposure is lower.

Affected Packages / Versions

  • Package: openclaw (npm)
  • Vulnerable: <= 2026.2.19-2
  • Patched: 2026.2.21 (next release target)

Fix Commit(s)

  • c45f3c5b004c8d63dc0e282e2176f8c9355d24f1
  • 08a7967936cfc0b2af6b27ec1f9272542648ad6c

Thanks @NucleiAv for reporting.

Database specific
{
    "github_reviewed_at": "2026-03-03T23:17:06Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-1021",
        "CWE-79"
    ],
    "nvd_published_at": null,
    "severity": "MODERATE"
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.2.21

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-cjv3-m589-v3rx/GHSA-cjv3-m589-v3rx.json"