CVE-2026-32036
Received Received - Intake
Path Traversal in OpenClaw Gateway Plugin Allows Unauthorized Access

Publication date: 2026-03-19

Last updated on: 2026-03-23

Assigner: VulnCheck

Description
OpenClaw gateway plugin versions prior to 2026.2.26 contain a path traversal vulnerability that allows remote attackers to bypass route authentication checks by manipulating /api/channels paths with encoded dot-segment traversal sequences. Attackers can craft alternate paths using encoded traversal patterns to access protected plugin channel routes when handlers normalize the incoming path, circumventing security controls.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-19
Last Modified
2026-03-23
Generated
2026-05-07
AI Q&A
2026-03-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.2.6 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CWE-289 The product performs authentication based on the name of a resource being accessed, or the name of the actor performing the access, but it does not properly check all possible names for that resource or actor.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can allow unauthorized remote attackers to bypass authentication and access protected routes within the OpenClaw gateway plugin. As a result, attackers may gain access to sensitive plugin channel routes that should be restricted, potentially leading to unauthorized information disclosure or manipulation of plugin functionality.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


Can you explain this vulnerability to me?

The vulnerability exists in OpenClaw gateway plugin versions prior to 2026.2.26 and is a path traversal issue. It allows remote attackers to bypass route authentication checks by manipulating the /api/channels paths using encoded dot-segment traversal sequences. This means attackers can craft alternate paths with encoded traversal patterns that, when normalized by the handlers, let them access protected plugin channel routes, effectively circumventing security controls.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart