Impact
OpenClaw implementations before version 2026.3.31 fail to terminate active WebSocket sessions when the device token is rotated. The flaw permits an attacker who has already obtained valid credentials to maintain persistent unauthorized access through the existing WebSocket connections after the token change. This is a session-management weakness identified as CWE‑613.
Affected Systems
The vulnerability affects the OpenClaw product from OpenClaw, impacting all releases older than 2026.3.31 that use the device.token.rotate API. No specific distribution channel or additional products are listed.
Risk and Exploitability
The CVSS score of 2.3 indicates a low severity impact. The EPSS score is less than 1 %, suggesting a low probability of exploitation in the wild. The vulnerability is not registered in the CISA KEV catalog. Attackers would need to be already compromised to exploit the flaw and rely on the persistence of open WebSocket connections. No public exploits are known.
OpenCVE Enrichment
Github GHSA