CVE-2026-32004: OpenClaw has encoded-path auth bypass in plugin `/api/channels` route classification
(updated )
Encoded alternate-path requests could bypass plugin route auth checks for /api/channels/* due to canonicalization depth mismatch in vulnerable builds.
References
- github.com/advisories/GHSA-v865-p3gq-hw6m
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/2fd8264ab03bd178e62a5f0c50d1c8556c17f12d
- github.com/openclaw/openclaw/commit/7a7eee920a176a0043398c6b37bf4cc6eb983eeb
- github.com/openclaw/openclaw/commit/93b07240257919f770d1e263e1f22753937b80ea
- github.com/openclaw/openclaw/commit/d74bc257d8432f17e50b23ae713d7e0623a1fe0f
- github.com/openclaw/openclaw/security/advisories/GHSA-v865-p3gq-hw6m
- nvd.nist.gov/vuln/detail/CVE-2026-32004
- www.vulncheck.com/advisories/openclaw-authentication-bypass-via-encoded-path-in-api-channels-route
Code Behaviors & Features
Detect and mitigate CVE-2026-32004 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →