Description
OpenClaw before 2026.4.2 exposes configPath and stateDir metadata in Gateway connect success snapshots to non-admin authenticated clients. Non-admin clients can recover host-specific filesystem paths and deployment details, enabling host fingerprinting and facilitating chained attacks.
Problem types
CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere
Product status
Any version before 2026.4.2
2026.4.2 (semver)
Credits
wang dong (@topsec-bunney)
References
github.com/...enclaw/security/advisories/GHSA-2f7j-rp58-mr42 (GitHub Security Advisory (GHSA-2f7j-rp58-mr42))
github.com/...ommit/676b748056b5efca6f1255708e9dd9469edf5e2e (Patch Commit)
www.vulncheck.com/...disclosure-via-gateway-connect-snapshot (VulnCheck Advisory: OpenClaw < 2026.4.2 - Information Disclosure via Gateway Connect Snapshot)