Hook Session-Key Bypass Vulnerability in OpenClaw by OpenClaw
CVE-2026-45002

6.3MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
11 May 2026

What is CVE-2026-45002?

OpenClaw version prior to 2026.4.20 is vulnerable to a hook session-key bypass, which enables attackers to evade the hooks.allowRequestSessionKey opt-in restriction. This vulnerability arises from the ability to render session keys influenced by external factors through templated hook mappings, effectively compromising webhook routing isolation controls. Users are advised to upgrade to the latest version to mitigate this security risk.

Affected Version(s)

OpenClaw 0 < 2026.4.20

OpenClaw 2026.4.20

References

CVSS V4

Score:
6.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zsx (@zsxsoft)
KeenSecurityLab
qclawer
.