GHSA-vvjh-f6p9-5vcf: OpenClaw Canvas Authentication Bypass Vulnerability
highvulnerability
security
Source: GitHub Advisory DatabaseMarch 4, 2026
Summary
OpenClaw's canvas endpoints have an authentication bypass vulnerability where the `authorizeCanvasRequest()` function grants access to any HTTP request from a private IP address if ANY WebSocket client from that same IP is authenticated, without verifying the request belongs to the same user or session. This is dangerous in shared IP environments like corporate NAT, VPNs, or Kubernetes clusters, where an unauthenticated attacker can gain full canvas access by sharing an IP with a legitimate authenticated client.
Classification
Attack SophisticationModerate
Affected Packages
openclaw@< 2026.2.19 (fixed: 2026.2.19)
Original source: https://github.com/advisories/GHSA-vvjh-f6p9-5vcf
First tracked: March 4, 2026 at 03:00 PM
Classified by LLM (prompt v3) · confidence: 95%