#VU125286 Insufficient Session Expiration in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a local user to continue using stale authorization state.
The vulnerability exists due to insufficient session expiration in the resolvedAuth closure when handling newly accepted gateway connections after a config reload. A local user can trigger or rely on a config reload and then establish a new gateway connection to continue using stale authorization state.
This issue is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary.