CVE ReportsOpenClaw Chutes: The 'Trust Me Bro' OAuth State Bypass Vulnerability ID:...
Vulnerability ID: GHSA-7RCP-MXPQ-72PJ
CVSS Score: 4.3
Published: 2026-02-18
A logic flaw in OpenClaw's manual OAuth input parsing allowed attackers to bypass state validation by simply providing a bare authorization code. The application helpfully, but insecurely, assumed that any non-URL input was a valid code and automatically attached the expected session state to it, enabling credential substitution attacks.
OpenClaw tried to make manual OAuth easy by letting users paste just the code. Instead, they broke CSRF protection. Attackers can trick victims into logging into the attacker's account by providing a raw code, which the app blindly accepts.
2026.2.14)Remove permissive regex fallback and enforce strict state validation
- if (!/\s/.test(trimmed) && !trimmed.includes("://") && trimmed.length > 0) {
- return { code: trimmed, state: expectedState };
- }
+ if (!trimmed.includes("?") && !trimmed.includes("=")) {
+ return { error: "Paste the full redirect URL (must include code + state)." };
+ }
Remediation Steps:
openclaw to version v2026.2.14 or later.Read the full report for GHSA-7RCP-MXPQ-72PJ on our website for more details including interactive diagrams and full exploit analysis.