Impact
OpenClaw releases prior to 2026.4.2 allow the configuration of non-loopback WebSocket gateway endpoints that accept plain text ws:// connections. When a client connects, the system automatically transmits stored gateway credentials over these unencrypted links. The vulnerability can be exploited by forging discovery responses or manipulating setup codes, causing legitimate clients to be redirected to malicious endpoints. The result is the disclosure of plaintext gateway credentials, which could be used for unauthorized control of the gateway or to pivot to other systems on the network.
Affected Systems
All OpenClaw installations running versions older than 2026.4.2 are affected. The vulnerability is present in the Node.js implementation of the OpenClaw platform, exposing non-loopback ws:// WebSocket endpoints to external traffic.
Risk and Exploitability
The CVSS score of 5.9 indicates moderate severity. The EPSS score of < 1% suggests a very low but non-zero probability of exploitation. The vulnerability is not listed in CISA KEV. Attackers can remotely exploit the flaw by interacting with the vulnerable WebSocket gateway, but the attack requires that the endpoint be reachable and that the client follows redirected discovery steps; these preconditions are inferred from the description. Because the security flaw leads solely to credential disclosure, it does not directly grant remote code execution, yet the leaked credentials could allow an attacker to take over or compromise the gateway and potentially access other network assets.
OpenCVE Enrichment
Github GHSA