Metadata Spoofing Vulnerability in OpenClaw by OpenClaw Technologies
CVE-2026-32014

8.6HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
19 March 2026

What is CVE-2026-32014?

OpenClaw versions earlier than 2026.2.26 are susceptible to a metadata spoofing vulnerability. This issue arises when the reconnect platform and deviceFamily fields are accepted from the client without proper binding into the device-auth signature. An attacker, already possessing a paired node identity on a trusted network, can exploit this flaw to spoof reconnect metadata. This enables them to bypass platform-specific node command policies, thereby compromising access to sensitive commands that should remain restricted.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

OpenClaw 0 < 2026.2.26

OpenClaw 2026.2.26

References

CVSS V4

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

76embiid21
.