Vulnerability Description
OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identity on the trusted network can spoof reconnect metadata to bypass platform-based node command policies and gain access to restricted commands.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.2.26 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/7d8aeaaf06e2e616545d2c2cec7fa27f36b5Patch
- https://github.com/openclaw/openclaw/security/advisories/GHSA-r65x-2hqr-j5hfVendor Advisory
- https://www.vulncheck.com/advisories/openclaw-node-reconnect-metadata-spoofing-vThird Party Advisory
FAQ
What is CVE-2026-32014?
CVE-2026-32014 is a vulnerability with a CVSS score of 8.0 (HIGH). OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth si...
How severe is CVE-2026-32014?
CVE-2026-32014 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32014?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.