CVE-2026-42421

MEDIUM

OpenClaw < 2026.4.8 - WebSocket Session Persistence via Shared Gateway Token Rotation

Title source: cna
STIX 2.1

Description

OpenClaw before 2026.4.8 contains a session management vulnerability where existing WebSocket sessions survive shared gateway token rotation. Attackers can maintain unauthorized access to WebSocket connections after token rotation by exploiting the failure to disconnect existing shared-token sessions.

Scores

CVSS v3 5.4
EPSS 0.0003
EPSS Percentile 7.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-613
Status published
Products (2)
OpenClaw/OpenClaw < 2026.4.8
OpenClaw/OpenClaw 2026.4.8
Published Apr 28, 2026
Tracked Since Apr 29, 2026