OpenClaw before 2026.4.2 accepts non-loopback cleartext ws:// gateway endpoints and transmits stored gateway credentials over unencrypted connections. Attackers can forge discovery results or craft setup codes to redirect clients to malicious endpoints, disclosing plaintext gateway credentials.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Apr 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.2 accepts non-loopback cleartext ws:// gateway endpoints and transmits stored gateway credentials over unencrypted connections. Attackers can forge discovery results or craft setup codes to redirect clients to malicious endpoints, disclosing plaintext gateway credentials. | |
| Title | OpenClaw < 2026.4.2 - Cleartext Credential Transmission via Unencrypted WebSocket Gateway Endpoints | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-319 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-20T23:08:07.952Z
Reserved: 2026-04-08T13:39:22.100Z
Link: CVE-2026-40045
No data.
Status : Received
Published: 2026-04-21T00:16:29.300
Modified: 2026-04-21T00:16:29.300
Link: CVE-2026-40045
No data.
OpenCVE Enrichment
Updated: 2026-04-21T01:00:12Z