Description
OpenClaw before 2026.3.31 fails to terminate active WebSocket sessions when rotating device tokens. Attackers with previously compromised credentials can maintain unauthorized access through existing WebSocket connections after token rotation.
Problem types
CWE-613: Insufficient Session Expiration
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
zsx (@zsxsoft)
KeenSecurityLab
References
github.com/...enclaw/security/advisories/GHSA-rfqg-qgf8-xr9x (GitHub Security Advisory (GHSA-rfqg-qgf8-xr9x))
github.com/...ommit/91f7a6b0fd67b703897e6e307762d471ca09333d (Patch Commit)
www.vulncheck.com/...sion-termination-in-device-token-rotate (VulnCheck Advisory: OpenClaw < 2026.3.31 - Incomplete WebSocket Session Termination in device.token.rotate)