CVE-2026-32036
Path Traversal in OpenClaw Gateway Plugin Allows Unauthorized Access
Publication date: 2026-03-19
Last updated on: 2026-03-23
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.2.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
| CWE-289 | The product performs authentication based on the name of a resource being accessed, or the name of the actor performing the access, but it does not properly check all possible names for that resource or actor. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can allow unauthorized remote attackers to bypass authentication and access protected routes within the OpenClaw gateway plugin. As a result, attackers may gain access to sensitive plugin channel routes that should be restricted, potentially leading to unauthorized information disclosure or manipulation of plugin functionality.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
Can you explain this vulnerability to me?
The vulnerability exists in OpenClaw gateway plugin versions prior to 2026.2.26 and is a path traversal issue. It allows remote attackers to bypass route authentication checks by manipulating the /api/channels paths using encoded dot-segment traversal sequences. This means attackers can craft alternate paths with encoded traversal patterns that, when normalized by the handlers, let them access protected plugin channel routes, effectively circumventing security controls.