OpenClaw before 2026.3.31 fails to terminate active WebSocket sessions when rotating device tokens. Attackers with previously compromised credentials can maintain unauthorized access through existing WebSocket connections after token rotation.
References
Configurations
History
29 Apr 2026, 14:08
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/91f7a6b0fd67b703897e6e307762d471ca09333d - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-rfqg-qgf8-xr9x - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-incomplete-websocket-session-termination-in-device-token-rotate - Third Party Advisory | |
| First Time |
Openclaw openclaw
Openclaw |
|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
23 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 22:16
Updated : 2026-04-29 14:08
NVD link : CVE-2026-41356
Mitre link : CVE-2026-41356
CVE.ORG link : CVE-2026-41356
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-613
Insufficient Session Expiration
