Description
OpenClaw before 2026.4.8 contains a session management vulnerability where existing WebSocket sessions survive shared gateway token rotation. Attackers can maintain unauthorized access to WebSocket connections after token rotation by exploiting the failure to disconnect existing shared-token sessions.
Problem types
CWE-613: Insufficient Session Expiration
Product status
Any version before 2026.4.8
2026.4.8 (semver)
Credits
KEXNA (@kexinoh)
References
github.com/...enclaw/security/advisories/GHSA-5h3f-885m-v22w (GitHub Security Advisory (GHSA-5h3f-885m-v22w))
github.com/...ommit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5 (Patch Commit)
www.vulncheck.com/...tence-via-shared-gateway-token-rotation (VulnCheck Advisory: OpenClaw < 2026.4.8 - WebSocket Session Persistence via Shared Gateway Token Rotation)