CVE-2026-32897 Overview
OpenClaw versions prior to 2026.2.22 contain a cryptographic vulnerability where the gateway.auth.token is reused as a fallback hash secret for owner-ID prompt obfuscation. This dual-use of authentication secrets occurs when commands.ownerDisplay is set to hash and commands.ownerDisplaySecret is left unset. Attackers with access to system prompts sent to third-party model providers can derive the gateway authentication token from the hash outputs, compromising gateway authentication security.
Critical Impact
Authentication token exposure through hash output analysis enables attackers to compromise gateway authentication, potentially gaining unauthorized access to protected resources and API endpoints.
Affected Products
- OpenClaw versions prior to 2026.2.22
- OpenClaw for Node.js (all affected versions)
Discovery Timeline
- 2026-03-21 - CVE-2026-32897 published to NVD
- 2026-03-24 - Last updated in NVD database
Technical Details for CVE-2026-32897
Vulnerability Analysis
This vulnerability stems from improper key management practices (CWE-320) within OpenClaw's owner-ID hashing mechanism. When administrators configure the application to hash owner IDs for privacy purposes using the commands.ownerDisplay setting but fail to specify a dedicated commands.ownerDisplaySecret, the system falls back to using the gateway.auth.token as the hashing secret.
This design flaw creates a dangerous dual-use scenario where a single secret serves two distinct security purposes: gateway authentication and prompt data obfuscation. Since hashed owner IDs may be included in system prompts sent to third-party AI model providers, attackers with visibility into these prompts can potentially perform cryptanalytic attacks against the hash outputs.
Root Cause
The root cause is the fallback mechanism that reuses gateway.auth.token as a hashing secret when commands.ownerDisplaySecret is not explicitly configured. This violates the principle of cryptographic key separation, where secrets should be dedicated to single purposes to prevent cross-domain security compromises. The vulnerability exposes authentication credentials through a secondary channel that may not be subject to the same access controls.
Attack Vector
The attack requires network access and involves analyzing hash outputs that appear in system prompts. The attack complexity is high as it requires:
- Access to system prompts transmitted to third-party model providers
- Sufficient hash outputs to perform cryptanalytic analysis
- Understanding of the hashing algorithm and input structure used by OpenClaw
An attacker who successfully derives the gateway.auth.token from hash outputs could then use this token to authenticate to the OpenClaw gateway, bypassing intended access controls.
The vulnerability mechanism involves the fallback logic that selects gateway.auth.token when commands.ownerDisplaySecret is undefined. For detailed technical implementation, refer to the GitHub Security Advisory.
Detection Methods for CVE-2026-32897
Indicators of Compromise
- Review OpenClaw configuration files for instances where commands.ownerDisplay is set to hash without a corresponding commands.ownerDisplaySecret value
- Audit logs for unexpected or unauthorized gateway authentication attempts
- Monitor for unusual access patterns to APIs protected by gateway authentication
Detection Strategies
- Implement configuration scanning to detect missing commands.ownerDisplaySecret when owner display hashing is enabled
- Deploy monitoring for gateway authentication anomalies that may indicate credential compromise
- Review third-party model provider access logs for potential data exfiltration
Monitoring Recommendations
- Enable detailed logging for gateway authentication events to establish baselines and detect anomalies
- Configure alerts for configuration changes affecting commands.ownerDisplay or commands.ownerDisplaySecret settings
- Periodically audit system prompts sent to external providers for sensitive information exposure
How to Mitigate CVE-2026-32897
Immediate Actions Required
- Upgrade OpenClaw to version 2026.2.22 or later immediately
- If upgrade is not immediately possible, explicitly set a unique commands.ownerDisplaySecret value separate from gateway authentication tokens
- Rotate gateway.auth.token if the vulnerable configuration was previously deployed
Patch Information
The vulnerability has been addressed in OpenClaw version 2026.2.22. The fix ensures that a dedicated secret is required for owner-ID hashing and removes the fallback behavior that reused the gateway authentication token.
Workarounds
- Explicitly configure commands.ownerDisplaySecret with a unique, randomly generated secret value distinct from authentication tokens
- Disable owner-ID hashing by setting commands.ownerDisplay to a non-hash value if the feature is not required
- Implement network-level controls to limit access to system prompts sent to third-party providers
# Configuration example - Set a dedicated owner display secret
# In your OpenClaw configuration file:
commands:
ownerDisplay: hash
ownerDisplaySecret: "<unique-randomly-generated-secret>"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


