Description
OpenClaw before 2026.4.23 caches resolved webhook route secrets backed by SecretRef values, allowing stale secrets to remain valid after rotation and reload. Attackers with previously valid webhook route secrets can continue authenticating requests and invoking configured webhook task flows until gateway or plugin restart.
Published: 2026-05-11
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenClaw versions prior to 2026.4.23 cache webhook route secrets that are backed by SecretRef values. This is a CWE-672: accidental disclosure of sensitive information due to failure to invalidate cached secrets. The cache is not cleared when those secrets are rotated or reloaded, so an attacker who already possesses a valid secret can continue to authenticate webhook requests and trigger configured task flows, even after the secret has been changed by the legitimate owner. This flaw allows prolonged unauthorized use of the webhook API, potentially leading to data leakage or unauthorized execution of workflow tasks.

Affected Systems

The vulnerability affects OpenClaw OpenClaw software versions earlier than 2026.4.23. No specific downstream products are listed, but any deployment of the affected OpenClaw release that exposes webhook routing and uses SecretRef based secrets is impacted.

Risk and Exploitability

The CVSS score of 5.9 indicates a moderate impact. The EPSS score is currently unavailable, and the vulnerability is not listed in the CISA KEV catalog. Attackers acquire the flaw by possessing a previously valid webhook secret; they must then make webhook calls that use that secret, which will still be accepted until the gateway or plugin is restarted. No additional conditions or elevated privileges are required beyond secret possession. The vulnerability can be exploited remotely via the webhook endpoint, and it may enable attackers to perform repeated malicious task executions until a system restart clears the stale cache.

Generated by OpenCVE AI on May 11, 2026 at 19:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.4.23 or later to ensure the secret cache is invalidated upon rotation.
  • If an immediate upgrade is not possible, restart the OpenClaw gateway or the specific plugin to clear the cached secrets and force re-evaluation of the current SecretRef values.
  • Monitor webhook activity for anomalous requests and consider implementing an additional layer of secret rotation or revocation after deployment of the patch.

Generated by OpenCVE AI on May 11, 2026 at 19:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.23 caches resolved webhook route secrets backed by SecretRef values, allowing stale secrets to remain valid after rotation and reload. Attackers with previously valid webhook route secrets can continue authenticating requests and invoking configured webhook task flows until gateway or plugin restart.
Title OpenClaw < 2026.4.23 - Webhook Route Secret Cache Not Invalidated After Rotation
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-672
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L'}

cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-12T16:10:53.330Z

Reserved: 2026-05-08T16:43:53.068Z

Link: CVE-2026-45005

cve-icon Vulnrichment

Updated: 2026-05-12T16:10:49.926Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-11T18:16:40.813

Modified: 2026-05-12T14:20:56.547

Link: CVE-2026-45005

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T19:15:42Z

Weaknesses