Impact
OpenClaw versions prior to 2026.3.31 contain a trust‑decline flaw that allows an attacker to preserve a discovered endpoint in the remote onboarding process. The weakness, classified as CWE‑372, means that the system improperly accepts an attacker‑controlled URL, causing gateway credentials to be routed to a malicious endpoint. This can result in the disclosure or theft of sensitive credentials if an operator authorizes the prompt.
Affected Systems
All OpenClaw deployments running the Node.js implementation with a version before 2026.3.31 are affected. The vulnerability is present in the remote onboarding flow of the OpenClaw service.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. EPSS is unavailable. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote onboarding flows where an attacker initially discovers a malicious endpoint and then forces it to survive the trust decline process, requiring an operator to manually accept it. Once accepted, the system forwards credentials through the attacker‑controlled endpoint, enabling credential compromise.
OpenCVE Enrichment
Github GHSA