CVE-2026-35644

OpenClaw before 2026.3.22 contains an information disclosure vulnerability that allows attackers with operator.read scope to expose credentials embedded in channel baseUrl and httpUrl fields. Attackers can access gateway snapshots via config.get and channels.status endpoints to retrieve sensitive authentication information from URL userinfo components.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

15 Apr 2026, 16:03

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87 - () https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87 - Patch
References () https://github.com/openclaw/openclaw/commit/f0202264d0de7ad345382b9008c5963bcefb01b7 - () https://github.com/openclaw/openclaw/commit/f0202264d0de7ad345382b9008c5963bcefb01b7 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-ppwq-6v66-5m6j - () https://github.com/openclaw/openclaw/security/advisories/GHSA-ppwq-6v66-5m6j - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-credential-exposure-via-baseurl-fields-in-gateway-snapshots - () https://www.vulncheck.com/advisories/openclaw-credential-exposure-via-baseurl-fields-in-gateway-snapshots - Third Party Advisory
First Time Openclaw openclaw
Openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

09 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-09 22:16

Updated : 2026-04-15 16:03


NVD link : CVE-2026-35644

Mitre link : CVE-2026-35644

CVE.ORG link : CVE-2026-35644


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-312

Cleartext Storage of Sensitive Information