OpenClaw: /api/channels gateway-auth boundary bypass via path canonicalization mismatch
Moderate severity
GitHub Reviewed
Published
Feb 26, 2026
in
openclaw/openclaw
•
Updated Mar 25, 2026
Description
Published to the GitHub Advisory Database
Mar 12, 2026
Reviewed
Mar 12, 2026
Published by the National Vulnerability Database
Mar 19, 2026
Last updated
Mar 25, 2026
Summary
Gateway auth for plugin channel endpoints can be bypassed when path canonicalization differs between the gateway guard and plugin handler routing.
Details
On affected versions,
server-httponly applies gateway auth when rawrequestPathmatches exactly:/api/channels/api/channels/*If a plugin handler canonicalizes path input (for example
decodeURIComponent(pathname).toLowerCase()), requests like:/API/channels/nostr/default/profile/api/channels%2Fnostr%2Fdefault%2Fprofilecan be interpreted as
/api/channels/*by the plugin, while the gateway auth guard is skipped.Impact
Authentication boundary bypass for plugin channel HTTP routes under canonicalization mismatch conditions. Unauthorized callers may access plugin channel APIs that are expected to require gateway auth.
CWE: CWE-288 (Authentication Bypass Using an Alternate Path or Channel)
CVSS:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N(Base 5.3, Moderate)References