Cleartext Credential Transmission Vulnerability in OpenClaw by OpenClaw
CVE-2026-40045
5.9MEDIUM
What is CVE-2026-40045?
OpenClaw, prior to version 2026.4.2, has a vulnerability that permits the acceptance of non-loopback cleartext WebSocket (ws://) gateway endpoints. This security flaw can lead to the transmission of stored gateway credentials over unencrypted connections. Attackers can exploit this vulnerability to manipulate discovery results or devise setup codes to redirect clients to compromised endpoints, thereby revealing plaintext gateway credentials.
Affected Version(s)
OpenClaw 0 < 2026.4.2
OpenClaw 2026.4.2
References
CVSS V4
Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved
Credit
zsx (@zsxsoft)
KeenSecurityLab
