Skip to content

Commit 4648d6a

Browse files
1 parent 7bc78b5 commit 4648d6a

3 files changed

Lines changed: 87 additions & 48 deletions

File tree

Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8mr2-f9wf-hcfq",
4+
"modified": "2026-03-24T17:54:52Z",
5+
"published": "2026-03-21T03:31:15Z",
6+
"withdrawn": "2026-03-24T17:54:52Z",
7+
"aliases": [],
8+
"summary": "Duplicate Advisory: OpenClaw reuses the gateway auth token in the owner ID prompt hashing fallback",
9+
"details": "### Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-v6x2-2qvm-6gv8. This link is maintained to preserve external references.\n\n### Original Description\nOpenClaw versions prior to 2026.2.22 reuse gateway.auth.token as a fallback hash secret for owner-ID prompt obfuscation when commands.ownerDisplay is set to hash and commands.ownerDisplaySecret is unset, creating dual-use of authentication secrets across security domains. Attackers with access to system prompts sent to third-party model providers can derive the gateway authentication token from the hash outputs, compromising gateway authentication security.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
18+
}
19+
],
20+
"affected": [
21+
{
22+
"package": {
23+
"ecosystem": "npm",
24+
"name": "openclaw"
25+
},
26+
"ranges": [
27+
{
28+
"type": "ECOSYSTEM",
29+
"events": [
30+
{
31+
"introduced": "0"
32+
},
33+
{
34+
"fixed": "2026.2.22"
35+
}
36+
]
37+
}
38+
],
39+
"database_specific": {
40+
"last_known_affected_version_range": "<= 2026.2.21-2"
41+
}
42+
}
43+
],
44+
"references": [
45+
{
46+
"type": "WEB",
47+
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8"
48+
},
49+
{
50+
"type": "ADVISORY",
51+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32897"
52+
},
53+
{
54+
"type": "WEB",
55+
"url": "https://github.com/openclaw/openclaw/commit/c99e7696e6893083b256f0a6c88fb060f3a76fb7"
56+
},
57+
{
58+
"type": "PACKAGE",
59+
"url": "https://github.com/openclaw/openclaw"
60+
},
61+
{
62+
"type": "WEB",
63+
"url": "https://www.vulncheck.com/advisories/openclaw-authentication-token-reuse-in-owner-id-prompt-hashing-fallback"
64+
}
65+
],
66+
"database_specific": {
67+
"cwe_ids": [
68+
"CWE-522"
69+
],
70+
"severity": "LOW",
71+
"github_reviewed": true,
72+
"github_reviewed_at": "2026-03-24T17:54:52Z",
73+
"nvd_published_at": "2026-03-21T01:17:10Z"
74+
}
75+
}

advisories/github-reviewed/2026/03/GHSA-v6x2-2qvm-6gv8/GHSA-v6x2-2qvm-6gv8.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v6x2-2qvm-6gv8",
4-
"modified": "2026-03-03T23:01:30Z",
4+
"modified": "2026-03-24T17:55:00Z",
55
"published": "2026-03-03T23:01:30Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-32897"
8+
],
79
"summary": "OpenClaw reuses the gateway auth token in the owner ID prompt hashing fallback",
810
"details": "## Vulnerability\n\nOpenClaw reused `gateway.auth.token` (and `gateway.remote.token`) as a fallback hash secret for owner-ID prompt obfuscation when `commands.ownerDisplay=hash` and `commands.ownerDisplaySecret` was unset.\n\nThis created secret dual-use between gateway authentication and prompt metadata hashing.\n\n## Impact\n\n- Auth-secret dual-use across security domains (gateway auth and prompt metadata hashing).\n- Hash outputs are visible to third-party model providers in system prompts.\n- No direct plaintext token disclosure.\n- Practical risk is highest when operators use weak gateway tokens and leave owner hash secret unset.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Latest affected published version: `2026.2.21-2`\n- Vulnerable range: `<= 2026.2.21-2`\n- Patched version (planned next release): `2026.2.22`\n\n## Affected Components\n\n- `src/agents/cli-runner/helpers.ts`\n- `src/agents/pi-embedded-runner/run/attempt.ts`\n- `src/agents/pi-embedded-runner/compact.ts`\n\n## Remediation\n\n- Added a shared owner-display resolver and secret-generation helper.\n- Removed fallback to `gateway.auth.token` and `gateway.remote.token`.\n- Auto-generates and persists a dedicated `commands.ownerDisplaySecret` when hash mode is enabled and secret is missing.\n\n## Fix Commit(s)\n\n- c99e7696e6893083b256f0a6c88fb060f3a76fb7\n\n## Release Process Note\n\n`patched_versions` is pre-set to the planned next release (`2026.2.22`). Once npm release `2026.2.22` is published, this advisory only needs to be published.\n\nOpenClaw thanks @aether-ai-agent for reporting.",
911
"severity": [
@@ -41,13 +43,21 @@
4143
"type": "WEB",
4244
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6x2-2qvm-6gv8"
4345
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32897"
49+
},
4450
{
4551
"type": "WEB",
4652
"url": "https://github.com/openclaw/openclaw/commit/c99e7696e6893083b256f0a6c88fb060f3a76fb7"
4753
},
4854
{
4955
"type": "PACKAGE",
5056
"url": "https://github.com/openclaw/openclaw"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://www.vulncheck.com/advisories/openclaw-authentication-token-reuse-in-owner-id-prompt-hashing-fallback"
5161
}
5262
],
5363
"database_specific": {

advisories/unreviewed/2026/03/GHSA-8mr2-f9wf-hcfq/GHSA-8mr2-f9wf-hcfq.json

Lines changed: 0 additions & 46 deletions
This file was deleted.

0 commit comments

Comments
 (0)