Skip to content
CVSS 8.1 · HIGH

CVE-2026-43585

OpenClaw before 2026.4.15 captures resolved bearer-auth configuration at startup, allowing revoked tokens to remain valid after SecretRef rotation. Gateway HTTP and WebSocket handlers fail to re-resolve authentication per-request, enabling attackers to use rotated-out bearer tokens for unauthorized gateway access.

Ver en NVD

Análisis

OpenClaw fails to re-resolve bearer-auth configurations after secret rotation, allowing revoked tokens to remain valid for gateway access. While this is a high-severity authentication bypass, the software is a specialized tool with limited adoption in the community stack.

Severidad

Puntaje: 8.1(HIGH)
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: HIGH
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-672

EPSS

Sin puntaje EPSS aún (CVE muy reciente).

Descripción técnica

OpenClaw before 2026.4.15 captures resolved bearer-auth configuration at startup, allowing revoked tokens to remain valid after SecretRef rotation. Gateway HTTP and WebSocket handlers fail to re-resolve authentication per-request, enabling attackers to use rotated-out bearer tokens for unauthorized gateway access.

Publicada: 6/5/2026, 20:16:34
Última modificación: 6/5/2026, 21:20:52

Referencias

InicioEventosBlogRecursosEquipo