Description
OpenClaw before 2026.4.15 captures resolved bearer-auth configuration at startup, allowing revoked tokens to remain valid after SecretRef rotation. Gateway HTTP and WebSocket handlers fail to re-resolve authentication per-request, enabling attackers to use rotated-out bearer tokens for unauthorized gateway access.
Problem types
Operation on a Resource after Expiration or Release
Product status
Any version before 2026.4.15
2026.4.15 (semver)
Credits
zsx (@zsxsoft)
KeenSecurityLab
qclawer
References
github.com/...enclaw/security/advisories/GHSA-xmxx-7p24-h892 (GitHub Security Advisory (GHSA-xmxx-7p24-h892))
github.com/...ommit/acd4e0a32f12e1ad85f3130f63b42443ce90f094 (Patch Commit)
www.vulncheck.com/...n-bypass-via-stale-secretref-resolution (VulnCheck Advisory: OpenClaw < 2026.4.15 - Bearer Token Validation Bypass via Stale SecretRef Resolution)