Cleartext Credential Transmission Vulnerability in OpenClaw by OpenClaw
CVE-2026-40045

5.9MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
20 April 2026

What is CVE-2026-40045?

OpenClaw, prior to version 2026.4.2, has a vulnerability that permits the acceptance of non-loopback cleartext WebSocket (ws://) gateway endpoints. This security flaw can lead to the transmission of stored gateway credentials over unencrypted connections. Attackers can exploit this vulnerability to manipulate discovery results or devise setup codes to redirect clients to compromised endpoints, thereby revealing plaintext gateway credentials.

Affected Version(s)

OpenClaw 0 < 2026.4.2

OpenClaw 2026.4.2

References

CVSS V4

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zsx (@zsxsoft)
KeenSecurityLab
.