CVE-2026-43585
OpenClaw before 2026.4.15 captures resolved bearer-auth configuration at startup, allowing revoked tokens to remain valid after SecretRef rotation. Gateway HTTP and WebSocket handlers fail to re-resolve authentication per-request, enabling attackers to use rotated-out bearer tokens for unauthorized gateway access.
Ver en NVDAnálisis
OpenClaw fails to re-resolve bearer-auth configurations after secret rotation, allowing revoked tokens to remain valid for gateway access. While this is a high-severity authentication bypass, the software is a specialized tool with limited adoption in the community stack.
Severidad
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HCWE-672EPSS
Sin puntaje EPSS aún (CVE muy reciente).
Descripción técnica
OpenClaw before 2026.4.15 captures resolved bearer-auth configuration at startup, allowing revoked tokens to remain valid after SecretRef rotation. Gateway HTTP and WebSocket handlers fail to re-resolve authentication per-request, enabling attackers to use rotated-out bearer tokens for unauthorized gateway access.