#VU125247 Insufficient Session Expiration in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to maintain access to an active WebSocket session after credential rotation.
The vulnerability exists due to improper session expiration in the WebSocket session handling for the gateway device.token.rotate operation when rotating device credentials. A remote user can continue using an already-authenticated WebSocket session to maintain access to an active WebSocket session after credential rotation.
This is a post-compromise revocation gap affecting already-authenticated sessions.