Plaintext Nostr Private Key Exposure in OpenClaw by OpenClaw
CVE-2026-41385

7.1HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
28 April 2026

What is CVE-2026-41385?

OpenClaw versions prior to 2026.3.31 are susceptible to a security vulnerability where Nostr private keys are stored in plaintext within the configuration files. This flawed storage mechanism permits attackers to exploit the config.get method, bypassing the existing redaction processes. As a result, unredacted configuration data can be retrieved, granting unauthorized access to plaintext signing keys critical for Nostr protocol transactions. This exposure poses significant risks and calls for urgent system updates.

Affected Version(s)

OpenClaw 0 < 2026.3.31

OpenClaw 2026.3.31

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

ccreater (@ccreater222)
KeenSecurityLab
qclawer
.