When the optional Chrome extension relay is enabled, /extension accepted unauthenticated WebSocket upgrades while /json/* and /cdp required auth.
openclaw (npm)<= 2026.2.172026.2.17This is a local-only issue on loopback (127.0.0.1) and only applies when the extension relay feature is in use. A local process on the same machine could connect to /extension without the token and interfere with extension-relay behavior.
No remote network exploit path is involved.
/extension and /cdp relay WebSocket endpoints.gateway.auth.token / OPENCLAW_GATEWAY_TOKEN.7e54b6c96feb1a5c30884f2b32037b8dadd0e532OpenClaw thanks @tdjackey for reporting.
{
"severity": "MODERATE",
"cwe_ids": [
"CWE-306"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-03T21:42:27Z",
"nvd_published_at": null
}