Home

Description

OpenClaw before 2026.4.15 captures resolved bearer-auth configuration at startup, allowing revoked tokens to remain valid after SecretRef rotation. Gateway HTTP and WebSocket handlers fail to re-resolve authentication per-request, enabling attackers to use rotated-out bearer tokens for unauthorized gateway access.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-06 | Updated 2026-05-07 | Assigner VulnCheck




CRITICAL: 9.2CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Operation on a Resource after Expiration or Release

Product status

Default status
unaffected

Any version before 2026.4.15
affected

2026.4.15 (semver)
unaffected

Credits

zsx (@zsxsoft) reporter

KeenSecurityLab coordinator

qclawer tool

References

github.com/...enclaw/security/advisories/GHSA-xmxx-7p24-h892 (GitHub Security Advisory (GHSA-xmxx-7p24-h892)) vendor-advisory

github.com/...ommit/acd4e0a32f12e1ad85f3130f63b42443ce90f094 (Patch Commit) patch

www.vulncheck.com/...n-bypass-via-stale-secretref-resolution (VulnCheck Advisory: OpenClaw < 2026.4.15 - Bearer Token Validation Bypass via Stale SecretRef Resolution) third-party-advisory

cve.org (CVE-2026-43585)

nvd.nist.gov (CVE-2026-43585)

Download JSON