Description
OpenClaw before 2026.3.22 contains an information disclosure vulnerability that allows attackers with operator.read scope to expose credentials embedded in channel baseUrl and httpUrl fields. Attackers can access gateway snapshots via config.get and channels.status endpoints to retrieve sensitive authentication information from URL userinfo components.
Published: 2026-04-09
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Credential Exposure
Action: Immediate Patch
AI Analysis

Impact

OpenClaw versions prior to 2026.3.22 contain an information‑disclosure flaw that permits an authenticated operator with read scope to retrieve credentials embedded in channel baseUrl and httpUrl fields. By calling the publicly exposed config.get and channels.status endpoints, an attacker can extract userinfo components from the URLs, exposing usernames and passwords used by the gateway to communicate with downstream services. This is a classic credential exposure scenario (CWE-312) that can lead to unauthorized access to operational components and potential lateral movement within the environment.

Affected Systems

The vulnerability affects all installations of the OpenClaw application with a version earlier than 2026.3.22. Any instance exposing the config.get or channels.status APIs is susceptible, regardless of the specific gateway or channel configuration.

Risk and Exploitability

With a CVSS score of 7.1, the flaw is classified as high severity. The exploitation requires only credentialed read access to two standard API endpoints; no elevated privileges or code execution are necessary. EPSS data is unavailable, but the breadth of exposure and the ease of triggering the requests make the risk significant. Although not listed in the CISA KEV catalog, the high score and simple attack path indicate a priority remediation.

Generated by OpenCVE AI on April 9, 2026 at 22:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.3.22 or later (apply the vendor patch).
  • Restrict the operator.read scope to trusted users and audit API access to prevent abuse.

Generated by OpenCVE AI on April 9, 2026 at 22:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.22 contains an information disclosure vulnerability that allows attackers with operator.read scope to expose credentials embedded in channel baseUrl and httpUrl fields. Attackers can access gateway snapshots via config.get and channels.status endpoints to retrieve sensitive authentication information from URL userinfo components.
Title OpenClaw < 2026.3.22 - Credential Exposure via baseUrl Fields in Gateway Snapshots
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-312
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-10T15:55:06.465Z

Reserved: 2026-04-04T12:30:33.464Z

Link: CVE-2026-35644

cve-icon Vulnrichment

Updated: 2026-04-10T15:52:22.409Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T22:16:33.873

Modified: 2026-04-15T16:03:03.657

Link: CVE-2026-35644

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:28:20Z

Weaknesses