#VU125142 Improper access control in OpenClaw - CVE-2026-32302
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote attacker to disclose sensitive information and perform unauthorized modifications.
The vulnerability exists due to improper access control in the WebSocket handshake logic when handling browser-originated WebSocket connections in trusted-proxy mode with proxy headers present. A remote attacker can trick a victim into loading a malicious page that establishes a cross-site WebSocket connection to disclose sensitive information and perform unauthorized modifications.
User interaction is required, and the issue affects deployments that expose the Gateway behind a trusted reverse proxy and rely on browser origin checks to restrict browser access.