Incomplete WebSocket Session Termination in OpenClaw by OpenClaw
CVE-2026-41356

2.3LOW

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2026-41356?

OpenClaw versions prior to 2026.3.31 exhibit a vulnerability where active WebSocket sessions are not properly terminated during device token rotation. This oversight allows attackers with previously compromised credentials to retain unauthorized access through existing WebSocket connections even after tokens have been updated, posing a significant security risk.

Affected Version(s)

OpenClaw 0 < 2026.3.31

OpenClaw 2026.3.31

References

CVSS V4

Score:
2.3
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zsx (@zsxsoft)
KeenSecurityLab
.