Skip to content
CVSS 8.1 · HIGH

CVE-2026-43585

OpenClaw before 2026.4.15 captures resolved bearer-auth configuration at startup, allowing revoked tokens to remain valid after SecretRef rotation. Gateway HTTP and WebSocket handlers fail to re-resolve authentication per-request, enabling attackers to use rotated-out bearer tokens for unauthorized gateway access.

View on NVD

Analysis

OpenClaw fails to re-resolve bearer-auth configurations after secret rotation, allowing revoked tokens to remain valid for gateway access. While this is a high-severity authentication bypass, the software is a specialized tool with limited adoption in the community stack.

Severity

Score: 8.1(HIGH)
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: HIGH
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-672

EPSS

No EPSS score yet (CVE may be too fresh).

Technical description

OpenClaw before 2026.4.15 captures resolved bearer-auth configuration at startup, allowing revoked tokens to remain valid after SecretRef rotation. Gateway HTTP and WebSocket handlers fail to re-resolve authentication per-request, enabling attackers to use rotated-out bearer tokens for unauthorized gateway access.

Published: 5/6/2026, 8:16:34 PM
Last modified: 5/6/2026, 9:20:52 PM

References

HomeEventsBlogResourcesTeam