Description
OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts.
Problem types
Cross-Site Request Forgery (CSRF)
Product status
Any version before 2026.2.14
Credits
Aether AI (@aether-ai-agent)
References
github.com/...enclaw/security/advisories/GHSA-7rcp-mxpq-72pj (GitHub Security Advisory (GHSA-7rcp-mxpq-72pj))
github.com/...ommit/a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47 (Patch Commit)
www.vulncheck.com/...tion-bypass-in-manual-chutes-login-flow (VulnCheck Advisory: OpenClaw < 2026.2.14 - OAuth State Validation Bypass in Manual Chutes Login Flow)