#VU125174 Improper access control in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote attacker to bypass Canvas HTTP and WebSocket authentication.
The vulnerability exists due to improper access control in authorizeCanvasRequest(...) in src/gateway/server/http-auth.ts when handling local-direct loopback Canvas and A2UI requests. A remote attacker can send specially crafted loopback Canvas HTTP or WebSocket requests to bypass Canvas HTTP and WebSocket authentication.
The issue affects local-direct loopback requests that were treated as an unconditional allow path before bearer authentication or an active node canvas capability was checked.