CVE-2026-28472: OpenClaw's gateway connect could skip device identity checks when auth.token was present but not yet validated
(updated )
The gateway WebSocket connect handshake could allow skipping device identity checks when auth.token was present but not yet validated.
References
- github.com/advisories/GHSA-rv39-79c4-7459
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/fe81b1d7125a014b8280da461f34efbf5f761575
- github.com/openclaw/openclaw/releases/tag/v2026.2.2
- github.com/openclaw/openclaw/security/advisories/GHSA-rv39-79c4-7459
- nvd.nist.gov/vuln/detail/CVE-2026-28472
- www.vulncheck.com/advisories/openclaw-device-identity-check-bypass-in-gateway-websocket-connect-handshake
Code Behaviors & Features
Detect and mitigate CVE-2026-28472 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →