Bearer Token Validation Bypass in OpenClaw API by OpenClaw
CVE-2026-43585
9.2CRITICAL
What is CVE-2026-43585?
Prior to version 2026.4.15, OpenClaw does not properly handle bearer token authentication post-SecretRef rotation. This oversight allows attackers to exploit revoked tokens that have not been invalidated correctly at the gateway, leading to unauthorized access. The system captures and retains the obsolete bearer-auth configuration during startup, resulting in a security weakness that can be leveraged for unauthorized actions via HTTP and WebSocket handlers.
Affected Version(s)
OpenClaw 0 < 2026.4.15
OpenClaw 2026.4.15
References
CVSS V4
Score:
9.2
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
zsx (@zsxsoft)
KeenSecurityLab
qclawer
