CVE-2026-41385
Received Received - Intake
Plaintext Private Key Exposure in OpenClaw Configuration via Insecure Access

Publication date: 2026-04-28

Last updated on: 2026-05-01

Assigner: VulnCheck

Description
OpenClaw before 2026.3.31 stores Nostr privateKey as plaintext in configuration, allowing exposure through config.get method calls that bypass redaction mechanisms. Attackers can retrieve unredacted configuration data to obtain plaintext signing keys used for Nostr protocol operations.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-05-01
Generated
2026-05-06
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.31 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-312 The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-41385 is a vulnerability in OpenClaw versions before 2026.3.31 where the Nostr privateKey is stored as plaintext in configuration files. This allows attackers to bypass redaction mechanisms by using the config.get method to retrieve unredacted configuration data, exposing sensitive signing keys used for Nostr protocol operations.

The root cause is that the privateKey was modeled as a plain string, which allowed it to appear in plaintext in configuration views and snapshots. The fix involved changing the privateKey field to a secret input type with redaction logic, marking it as sensitive in UI hints, and preventing exposure in snapshots and UI.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability involves storing Nostr private keys in plaintext within configuration files, allowing attackers to retrieve sensitive signing keys by bypassing redaction mechanisms.

This exposure of sensitive cryptographic keys can lead to unauthorized access and potential data breaches, which may violate data protection requirements under regulations such as GDPR and HIPAA that mandate secure handling and protection of sensitive information.

By failing to properly redact and secure private keys, the vulnerability undermines confidentiality controls required by these standards, increasing the risk of non-compliance.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive private signing keys used in the Nostr protocol. Attackers who exploit this can obtain plaintext private keys by bypassing redaction mechanisms, potentially allowing them to impersonate users, sign messages fraudulently, or compromise the integrity of communications relying on these keys.

Because the private keys are stored and exposed in plaintext, the risk of key leakage is significant, which can undermine the security of the OpenClaw platform and any dependent systems or users.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the Nostr privateKey is exposed in plaintext within the OpenClaw configuration files or through the config.get method calls that bypass redaction.

You can inspect configuration snapshots or views for unredacted privateKey fields. Since the vulnerability involves plaintext exposure, searching configuration files or outputs for the presence of private keys in cleartext is a key detection method.

Suggested commands include searching for the privateKey string in configuration files or outputs, for example using grep on Linux systems:

  • grep -r 'privateKey' /path/to/openclaw/config
  • Using application-specific commands or API calls to invoke config.get and inspecting if the returned data contains unredacted private keys.

Additionally, monitoring network traffic for configuration data leaks or unauthorized access to config.get method responses may help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately upgrade OpenClaw to version 2026.3.31 or later, where the issue has been fixed by implementing proper redaction of the Nostr privateKey in configuration views and snapshots.

The fix involves changing the privateKey field to a secret input type that supports redaction and secure handling, preventing exposure through config.get calls.

Until the upgrade can be applied, restrict access to configuration files and the config.get method to trusted users only, to reduce the risk of unauthorized retrieval of plaintext private keys.

Review and audit your configuration management and access controls to ensure sensitive keys are not exposed or accessible in plaintext.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart