CVE-2026-32036 - CERT CVE
ID CVE-2026-32036
Sažetak OpenClaw gateway plugin versions prior to 2026.2.26 contain a path traversal vulnerability that allows remote attackers to bypass route authentication checks by manipulating /api/channels paths with encoded dot-segment traversal sequences. Attackers can craft alternate paths using encoded traversal patterns to access protected plugin channel routes when handlers normalize the incoming path, circumventing security controls.
Reference
CVSS
Base: 6.5
Impact: 4.2
Exploitability:2.2
Pristup
VektorSloženostAutentikacija
NETWORK HIGH NONE
Impact
PovjerljivostCjelovitostDostupnost
LOW HIGH NONE
CVSS vektor CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Zadnje važnije ažuriranje 19-03-2026 - 22:16
Objavljeno 19-03-2026 - 22:16