#VU126428 Improper access control in OpenClaw

 

#VU126428 Improper access control in OpenClaw

Published: April 17, 2026


Vulnerability identifier: #VU126428
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
OpenClaw
Software vendor:
OpenClaw

Description

The vulnerability allows a remote user to disclose sensitive information.

The vulnerability exists due to improper access control in config.get redaction handling when returning configuration data through sourceConfig and runtimeConfig aliases. A remote user can read configuration data through alias fields that survive redaction to disclose sensitive information.

The issue affects authenticated gateway clients with config read access.


Remediation

Install security update from vendor's website.

External links