This advisory tracks a defense-in-depth hardening for canvas routes. In mixed-trust or network-visible deployments, prior canvas auth/fallback behavior could broaden access beyond intended boundaries.
OpenClaw’s default model is trusted host + loopback-first access. Some operators intentionally expose canvas routes on LAN/tailnet. This update is aimed at those broader deployment patterns.
Risk was highest in non-loopback or mixed-trust environments. In strict single-operator trusted-host setups, practical exposure is lower.
openclaw (npm)<= 2026.2.19-22026.2.21 (next release target)c45f3c5b004c8d63dc0e282e2176f8c9355d24f108a7967936cfc0b2af6b27ec1f9272542648ad6cThanks @NucleiAv for reporting.
{
"github_reviewed_at": "2026-03-03T23:17:06Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-1021",
"CWE-79"
],
"nvd_published_at": null,
"severity": "MODERATE"
}