Skip to content

Instantly share code, notes, and snippets.

@alon710
Created March 11, 2026 12:00
Show Gist options
  • Select an option

  • Save alon710/ba8dc0788a471b5a92fb9d0637418df7 to your computer and use it in GitHub Desktop.

Select an option

Save alon710/ba8dc0788a471b5a92fb9d0637418df7 to your computer and use it in GitHub Desktop.
CVE-2026-28472: CVE-2026-28472: Device Identity Verification Bypass in OpenClaw Gateway WebSocket Handshake - CVE Security Report

CVE-2026-28472: CVE-2026-28472: Device Identity Verification Bypass in OpenClaw Gateway WebSocket Handshake

CVSS Score: 8.1 Published: 2026-03-05 Full Report: https://cvereports.com/reports/CVE-2026-28472

Summary

CVE-2026-28472 is a critical security vulnerability in the OpenClaw automation platform affecting all versions prior to 2026.2.2. The vulnerability resides in the gateway's WebSocket connection handshake logic, where a flaw in authentication sequence allows unauthenticated attackers to bypass device identity verification. In environments utilizing secondary authentication providers, this can result in unauthorized operator access to the gateway.

TL;DR

A logic flaw in OpenClaw < 2026.2.2 allows attackers to bypass device identity checks during the WebSocket handshake by providing an unvalidated dummy token, potentially leading to unauthorized operator access.

Exploit Status: POC

Technical Details

  • CWE ID: CWE-306
  • Attack Vector: Network
  • CVSS v3.1: 8.1 (High)
  • EPSS Score: 0.00041 (12.29%)
  • Impact: Unauthorized Operator Access
  • Exploit Status: Proof of Concept
  • CISA KEV: Not Listed

Affected Systems

  • OpenClaw Gateway server component
  • OpenClaw WebSocket connection handler
  • OpenClaw: < 2026.2.2 (Fixed in: 2026.2.2)

Mitigation

  • Upgrade OpenClaw to version 2026.2.2 or higher.
  • Ensure the dangerouslyDisableDeviceAuth setting is set to false in the gateway configuration.
  • Restrict network access to the OpenClaw gateway WebSocket port using firewalls or VPNs.
  • Audit logs for unauthorized connection attempts mentioning device identity failures.

Remediation Steps:

  1. Verify the current running version of OpenClaw.
  2. Download the 2026.2.2 release from the official repository.
  3. Deploy the update to the gateway server.
  4. Restart the OpenClaw gateway service.
  5. Verify that WebSocket connections without valid tokens are correctly rejected before device identity checks are skipped.

References


Generated by CVEReports - Automated Vulnerability Intelligence

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment