CVE-2026-41356

OpenClaw before 2026.3.31 fails to terminate active WebSocket sessions when rotating device tokens. Attackers with previously compromised credentials can maintain unauthorized access through existing WebSocket connections after token rotation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

29 Apr 2026, 14:08

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/91f7a6b0fd67b703897e6e307762d471ca09333d - () https://github.com/openclaw/openclaw/commit/91f7a6b0fd67b703897e6e307762d471ca09333d - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-rfqg-qgf8-xr9x - () https://github.com/openclaw/openclaw/security/advisories/GHSA-rfqg-qgf8-xr9x - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-incomplete-websocket-session-termination-in-device-token-rotate - () https://www.vulncheck.com/advisories/openclaw-incomplete-websocket-session-termination-in-device-token-rotate - Third Party Advisory
First Time Openclaw openclaw
Openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

23 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 22:16

Updated : 2026-04-29 14:08


NVD link : CVE-2026-41356

Mitre link : CVE-2026-41356

CVE.ORG link : CVE-2026-41356


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-613

Insufficient Session Expiration