CVE-2026-35644
Received Received - Intake
Information Disclosure in OpenClaw via Exposed URL Credentials

Publication date: 2026-04-09

Last updated on: 2026-04-15

Assigner: VulnCheck

Description
OpenClaw before 2026.3.22 contains an information disclosure vulnerability that allows attackers with operator.read scope to expose credentials embedded in channel baseUrl and httpUrl fields. Attackers can access gateway snapshots via config.get and channels.status endpoints to retrieve sensitive authentication information from URL userinfo components.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-15
Generated
2026-05-06
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.22 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-312 The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in OpenClaw versions before 2026.3.22 and involves information disclosure. Attackers who have operator.read scope permissions can exploit this flaw to access sensitive credentials embedded within the channel baseUrl and httpUrl fields.

Specifically, attackers can retrieve gateway snapshots through the config.get and channels.status endpoints, which expose authentication information contained in the userinfo components of URLs.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of sensitive authentication credentials. This exposure could allow attackers to gain further unauthorized access or escalate privileges within the affected system.

Since the attacker needs operator.read scope, the impact depends on the level of access already granted, but the leakage of credentials can facilitate additional attacks or compromise other systems.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in OpenClaw allows attackers with operator.read scope to access sensitive authentication information embedded in URLs. This exposure of credentials could lead to unauthorized access to protected data, potentially resulting in violations of data protection regulations such as GDPR and HIPAA, which require safeguarding sensitive information and preventing unauthorized disclosure.

Specifically, the information disclosure could compromise confidentiality requirements mandated by these standards, thereby affecting compliance.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart