An open API service providing security vulnerability metadata for many open source software ecosystems.

GSA_kwCzR0hTQS1ydjJxLWYyaDUtNnhtZ84ABTFm

Moderate CVSS: 5.4

OpenClaw's Node role device-identity bypass allows unauthorized node.event injection

Affected Packages Affected Versions Fixed Versions
npm:openclaw
PURL: pkg:npm/openclaw
< 2026.2.22 2026.2.22
0 Dependent packages
0 Dependent repositories
6,021,905 Downloads last month

Affected Version Ranges

All affected versions

0.0.1, 2026.1.29, 2026.1.29-beta.1, 2026.1.29-beta.2, 2026.1.29-beta.3, 2026.1.29-beta.4, 2026.1.29-beta.5, 2026.1.29-beta.7, 2026.1.30, 2026.2.1, 2026.2.2, 2026.2.2-1, 2026.2.2-2, 2026.2.2-3, 2026.2.3, 2026.2.3-1, 2026.2.6, 2026.2.6-1, 2026.2.6-2, 2026.2.6-3, 2026.2.9, 2026.2.12, 2026.2.13, 2026.2.14, 2026.2.15, 2026.2.17, 2026.2.19, 2026.2.19-1, 2026.2.19-2, 2026.2.21, 2026.2.21-1, 2026.2.21-2, 2026.2.22-1, 2026.2.22-2

All unaffected versions

2026.2.22, 2026.2.23, 2026.2.24, 2026.2.25, 2026.2.26, 2026.3.1, 2026.3.2, 2026.3.7, 2026.3.8, 2026.3.11

Summary

A client authenticated with a shared gateway token could connect as role=node without device identity/pairing, then call node.event to trigger agent.request and voice.transcript flows.

Affected Packages / Versions

  • Package: npm openclaw
  • Affected versions: <= 2026.2.21-2
  • Patched version: 2026.2.22 (planned next release)

Details

The WebSocket connect path allowed device-less bypass whenever shared auth succeeded. That bypass did not restrict role, so a client could claim role=node with no device identity and still pass handshake auth. Because node.event is node-role allowed, this enabled unauthorized node event injection into agent-trigger flows.

Impact

Unauthorized node.event injection can trigger agent execution and voice transcript flows for clients that only hold the shared gateway token, without node device pairing.

Remediation

Upgrade to 2026.2.22 (or newer) once published. The fix requires device identity for role=node connects, even when shared-token auth succeeds.

Fix Commit(s)

  • ddcb2d79b17bf2a42c5037d8aeff1537a12b931e

Release Process Note

patched_versions is pre-set to the planned next release so once npm release 2026.2.22 is out, advisory publish is a single step.

OpenClaw thanks @tdjackey for reporting.

References: