Description
OpenClaw before 2026.4.2 contains a timing side channel vulnerability in shared-secret comparison call sites that use early length-mismatch checks instead of fixed-length comparison helpers. Attackers can measure timing differences to leak secret-length information, weakening constant-time handling for shared secrets.
Problem types
CWE-208 Observable Timing Discrepancy
Product status
Any version before 2026.4.2
2026.4.2 (semver)
Credits
KEXNA (@kexinoh)
References
github.com/...enclaw/security/advisories/GHSA-jj6q-rrrf-h66h (GitHub Security Advisory (GHSA-jj6q-rrrf-h66h))
github.com/...ommit/be10ecef770a4654519869c3641bbb91087c8c7b (Patch Commit)
www.vulncheck.com/...ide-channel-in-shared-secret-comparison (VulnCheck Advisory: OpenClaw < 2026.4.2 - Timing Side Channel in Shared-Secret Comparison)