Impact
OpenClaw versions prior to 2026.3.22 contain an information‑disclosure flaw that permits an authenticated operator with read scope to retrieve credentials embedded in channel baseUrl and httpUrl fields. By calling the publicly exposed config.get and channels.status endpoints, an attacker can extract userinfo components from the URLs, exposing usernames and passwords used by the gateway to communicate with downstream services. This is a classic credential exposure scenario (CWE-312) that can lead to unauthorized access to operational components and potential lateral movement within the environment.
Affected Systems
The vulnerability affects all installations of the OpenClaw application with a version earlier than 2026.3.22. Any instance exposing the config.get or channels.status APIs is susceptible, regardless of the specific gateway or channel configuration.
Risk and Exploitability
With a CVSS score of 7.1, the flaw is classified as high severity. The exploitation requires only credentialed read access to two standard API endpoints; no elevated privileges or code execution are necessary. EPSS data is unavailable, but the breadth of exposure and the ease of triggering the requests make the risk significant. Although not listed in the CISA KEV catalog, the high score and simple attack path indicate a priority remediation.
OpenCVE Enrichment