#VU125229 Improper access control in OpenClaw - CVE-2026-34503
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to retain access to an active WebSocket session after token revocation or device removal.
The vulnerability exists due to improper access control in src/gateway/server-methods/devices.ts and src/gateway/server.impl.ts when handling device removal or token revocation for existing WebSocket connections. A remote user can continue using an already-authenticated live session to retain access to an active WebSocket session after token revocation or device removal.
The session remains usable until it reconnects.