OpenClaw before 2026.3.28 fails to disconnect active WebSocket sessions when devices are removed or tokens are revoked. Attackers with revoked credentials can maintain unauthorized access through existing live sessions until forced reconnection.
References
Configurations
History
02 Apr 2026, 12:21
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/7a801cc451e9e667b705eeccff651923a1b8c863 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-2pr2-hcv6-7gwv - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-incomplete-websocket-session-termination-on-device-removal-and-token-revocation - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
31 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
31 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 15:16
Updated : 2026-04-02 12:21
NVD link : CVE-2026-34503
Mitre link : CVE-2026-34503
CVE.ORG link : CVE-2026-34503
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-613
Insufficient Session Expiration
