#VU125254 Improper access control in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote attacker to bypass shared authentication rate limiting.
The vulnerability exists due to improper access control in the mixed WebSocket authentication flow when handling a fake DeviceToken. A remote attacker can supply a fake DeviceToken to bypass shared authentication rate limiting.
The practical risk is primarily limited to deployments that rely on weak shared passwords.