Home

Description

OpenClaw before 2026.4.8 contains an authentication state management vulnerability where the resolvedAuth closure becomes stale after configuration reload. Newly accepted gateway connections continue using outdated resolved auth state, allowing attackers to bypass authentication controls through config reload operations.

PUBLISHED Reserved 2026-04-22 | Published 2026-04-28 | Updated 2026-04-28 | Assigner VulnCheck




LOW: 2.3CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-613: Insufficient Session Expiration

Product status

Default status
unaffected

Any version before 2026.4.8
affected

2026.4.8 (semver)
unaffected

Credits

KEXNA (@kexinoh) reporter

References

github.com/...enclaw/security/advisories/GHSA-68x5-xx89-w9mm (GitHub Security Advisory (GHSA-68x5-xx89-w9mm)) vendor-advisory

github.com/...ommit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5 (Patch Commit) patch

www.vulncheck.com/...-authentication-state-via-config-reload (VulnCheck Advisory: OpenClaw < 2026.4.8 - Stale Authentication State via Config Reload) third-party-advisory

cve.org (CVE-2026-41916)

nvd.nist.gov (CVE-2026-41916)

Download JSON