Session Management Vulnerability in OpenClaw by OpenClaw
CVE-2026-42421

2.3LOW

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
28 April 2026

What is CVE-2026-42421?

OpenClaw prior to version 2026.4.8 exhibits a session management flaw that allows WebSocket sessions to persist even after the rotation of shared gateway tokens. This oversight permits attackers to exploit the situation and retain unauthorized access to WebSocket connections, potentially leading to breaches of sensitive data and systems. It is crucial for users to update to the latest version to mitigate this risk.

Affected Version(s)

OpenClaw 0 < 2026.4.8

OpenClaw 2026.4.8

References

CVSS V4

Score:
2.3
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

KEXNA (@kexinoh)
.