OpenClaw before 2026.3.24 contains an authorization bypass vulnerability in the HTTP /v1/models endpoint that fails to enforce operator read scope requirements. Attackers with only operator.approvals scope can enumerate gateway model metadata through the HTTP compatibility route, bypassing the stricter WebSocket RPC authorization checks.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-68f8-9mhj-h2mp | OpenClaw has a Gateway HTTP /v1/models Route Bypasses Operator Read Scope |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 10 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.24 contains an authorization bypass vulnerability in the HTTP /v1/models endpoint that fails to enforce operator read scope requirements. Attackers with only operator.approvals scope can enumerate gateway model metadata through the HTTP compatibility route, bypassing the stricter WebSocket RPC authorization checks. | |
| Title | OpenClaw < 2026.3.24 - Authorization Bypass via HTTP /v1/models Endpoint | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-863 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-10T16:03:08.449Z
Reserved: 2026-04-04T12:28:49.756Z
Link: CVE-2026-35619
No data.
Status : Received
Published: 2026-04-10T17:17:04.140
Modified: 2026-04-10T17:17:04.140
Link: CVE-2026-35619
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA