Impact
The vulnerability arises in OpenClaw’s skills.status endpoint, which returns raw resolved configuration values for skill paths that require configuration. This disclosure can leak secrets to clients that possess the operator.read scope, revealing sensitive data such as tokens and other configuration settings. The flaw is a classic information‑leak weakness and directly threatens confidentiality of system configuration.
Affected Systems
Models of OpenClaw released before version 2026.2.14 are affected. Users deploying any OpenClaw instance with a version earlier than the 2026.2.14 release should verify their installed version and ensure it is updated.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, but the EPSS score of less than 1% suggests exploitation is unlikely. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, the attack requires an attacker who can access an operator.read client or forge such a request to the skills.status endpoint. Once such access is obtained, the attacker may retrieve configuration secrets unintentionally exposed by the API.
OpenCVE Enrichment
Github GHSA