#VU125229 Improper access control in OpenClaw - CVE-2026-34503

 

#VU125229 Improper access control in OpenClaw - CVE-2026-34503

Published: April 8, 2026


Vulnerability identifier: #VU125229
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-34503
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
OpenClaw
Software vendor:
OpenClaw

Description

The vulnerability allows a remote user to retain access to an active WebSocket session after token revocation or device removal.

The vulnerability exists due to improper access control in src/gateway/server-methods/devices.ts and src/gateway/server.impl.ts when handling device removal or token revocation for existing WebSocket connections. A remote user can continue using an already-authenticated live session to retain access to an active WebSocket session after token revocation or device removal.

The session remains usable until it reconnects.


Remediation

Install security update from vendor's website.

External links