CVE-2026-42421 PUBLISHED

OpenClaw < 2026.4.8 - WebSocket Session Persistence via Shared Gateway Token Rotation

Assigner: VulnCheck
Reserved: 27.04.2026 Published: 28.04.2026 Updated: 28.04.2026

OpenClaw before 2026.4.8 contains a session management vulnerability where existing WebSocket sessions survive shared gateway token rotation. Attackers can maintain unauthorized access to WebSocket connections after token rotation by exploiting the failure to disconnect existing shared-token sessions.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 2.3

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.4.8 (excl.)
  • Version 2026.4.8 is unaffected

Credits

  • KEXNA (@kexinoh) reporter

References

Problem Types

  • CWE-613: Insufficient Session Expiration CWE