OpenClaw before 2026.3.22 contains an information disclosure vulnerability that allows attackers with operator.read scope to expose credentials embedded in channel baseUrl and httpUrl fields. Attackers can access gateway snapshots via config.get and channels.status endpoints to retrieve sensitive authentication information from URL userinfo components.
References
Configurations
History
15 Apr 2026, 16:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87 - Patch | |
| References | () https://github.com/openclaw/openclaw/commit/f0202264d0de7ad345382b9008c5963bcefb01b7 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-ppwq-6v66-5m6j - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-credential-exposure-via-baseurl-fields-in-gateway-snapshots - Third Party Advisory | |
| First Time |
Openclaw openclaw
Openclaw |
|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
09 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 22:16
Updated : 2026-04-15 16:03
NVD link : CVE-2026-35644
Mitre link : CVE-2026-35644
CVE.ORG link : CVE-2026-35644
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-312
Cleartext Storage of Sensitive Information
