Description
OpenClaw before 2026.3.31 contains a trust-decline vulnerability that preserves attacker-discovered endpoints in remote onboarding flows. Attackers can route gateway credentials to malicious endpoints by having their discovered URL survive the trust decline process into manual prompts requiring operator acceptance.
Problem types
CWE-372: Incomplete Internal State Distinction
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
zsx (@zsxsoft)
KeenSecurityLab
References
github.com/...enclaw/security/advisories/GHSA-9f4w-67g7-mqwv (GitHub Security Advisory (GHSA-9f4w-67g7-mqwv))
github.com/...ommit/2a75416634837c21ed05b8c3ed906eb7a7807060 (Patch Commit)
www.vulncheck.com/...point-preservation-in-remote-onboarding (VulnCheck Advisory: OpenClaw < 2026.3.31 - Attacker-Discovered Endpoint Preservation in Remote Onboarding)