LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-22172

CVE-2026-22172 - Vulnerability Analysis

CriticalCVSS: 9.9

Last Updated: March 20, 2026

OpenClaw - Authorization Bypass

Published: March 20, 2026Updated: March 20, 2026Remote Exploitable

Overview

OpenClaw < 2026.3.12 contains an authorization bypass caused by self-declared elevated scopes in the WebSocket connect path, letting attackers perform admin-only operations without proper binding, exploit requires authenticated connection.

Severity & Score

Severity: Critical
CVSS Score: 9.9
EPSS Score: 1.3%(Probability of exploitation in next 30 days)

Impact

Attackers can perform admin-only gateway operations without authorization, leading to full administrative control.

Mitigation

Update to version 2026.3.12 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 20, 2026

šŸ”“ CVE-2026-22172 - Critical (9.9) OpenClaw versions prior to 2026.3.12 contain an authorization bypass vulnerability in the WebSocket connect path that allows shared-token or password-authenticated connections to self-declare elevated scopes without server-side binding. Attackers ... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-22172/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-22172
Severity
Critical
CVSS Score
9.9
Type
broken_access_control
Status
new
EPSS
1.3%
Social Posts
1

CWE

  • CWE-862

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS Score

1.3%Probability of exploitation in the next 30 days