OpenClaw before 2026.4.2 accepts non-loopback cleartext ws:// gateway endpoints and transmits stored gateway credentials over unencrypted connections. Attackers can forge discovery results or craft setup codes to redirect clients to malicious endpoints, disclosing plaintext gateway credentials.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.2 accepts non-loopback cleartext ws:// gateway endpoints and transmits stored gateway credentials over unencrypted connections. Attackers can forge discovery results or craft setup codes to redirect clients to malicious endpoints, disclosing plaintext gateway credentials. | |
| Title | OpenClaw < 2026.4.2 - Cleartext Credential Transmission via Unencrypted WebSocket Gateway Endpoints | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-319 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-04-20T23:08:07.952Z
Updated: 2026-04-21T13:37:43.951Z
Reserved: 2026-04-08T13:39:22.100Z
Link: CVE-2026-40045
Updated: 2026-04-21T13:37:40.313Z
Status : Awaiting Analysis
Published: 2026-04-21T00:16:29.300
Modified: 2026-04-21T16:20:24.180
Link: CVE-2026-40045
No data.