by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse accepted
- @LeSuisse published on GitHub
OpenClaw: Untrusted web origins can obtain authenticated operator.admin access in trusted-proxy mode
OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untrusted origin could connect through a trusted reverse proxy, inherit proxy-authenticated identity, and establish a privileged operator session. This vulnerability is fixed in 2026.3.11.
References
-
https://github.com/openclaw/openclaw/security/advisories/GHSA-5wcw-8jjv-m286 x_refsource_CONFIRM
-
https://github.com/openclaw/openclaw/releases/tag/v2026.3.11 x_refsource_MISC
Affected products
openclaw
- ==< 2026.3.11
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>