GHSA-vvgp-4c28-m3jm

Suggest an improvement
Source
https://github.com/advisories/GHSA-vvgp-4c28-m3jm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-vvgp-4c28-m3jm/GHSA-vvgp-4c28-m3jm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vvgp-4c28-m3jm
Downstream
Published
2026-03-03T21:52:16Z
Modified
2026-03-04T15:17:29.410995Z
Severity
  • 2.3 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
OpenClaw has a Trusted-proxy Control UI pairing bypass which allows unpaired node sessions
Details

Summary

A trusted-proxy Control UI pairing bypass accepted client.id=control-ui without device identity checks. The bypass did not require operator role, so an authenticated node role session could connect unpaired and reach node event methods.

Impact

With trusted-proxy authentication enabled, a node role websocket client could skip pairing by using client.id=control-ui. That created an authorization boundary bypass from a node-scoped connection into node event execution flows.

Affected Packages / Versions

  • Package: openclaw (npm)
  • Affected range: <= 2026.2.24
  • Latest published vulnerable version: 2026.2.24
  • Patched in next release: 2026.2.25 (pre-set below so this advisory is ready to publish after npm release)

Fix

The trusted-proxy Control UI bypass now additionally requires role === "operator".

Fix Commit(s)

  • ec45c317f5d0631a3d333b236da58c4749ede2a3

Release Process Note

patched_versions is intentionally pre-set to the release (2026.2.25). Advisory published with npm release 2026.2.25.2.25` is published, the remaining GHSA action is to publish this advisory.

OpenClaw thanks @tdjackey for reporting.

Database specific
{
    "github_reviewed_at": "2026-03-03T21:52:16Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-807"
    ],
    "nvd_published_at": null,
    "severity": "LOW"
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.2.25

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-vvgp-4c28-m3jm/GHSA-vvgp-4c28-m3jm.json"
last_known_affected_version_range
"<= 2026.2.24"