CVE-2026-43528
Undergoing Analysis Undergoing Analysis - In Progress
OpenClaw redaction bypass allows secret exposure via config aliases

Publication date: 2026-05-05

Last updated on: 2026-05-05

Assigner: VulnCheck

Description
OpenClaw before 2026.4.14 contains a redaction bypass vulnerability that allows authenticated gateway clients to receive unredacted secrets through sourceConfig and runtimeConfig alias fields. Attackers with config read access can exploit this to obtain provider API keys, gateway authentication material, and channel credentials that should have been redacted.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-05
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.4.14 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-212 The product stores, transfers, or shares a resource that contains sensitive information, but it does not properly remove that information before the product makes the resource available to unauthorized actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-43528 is a redaction bypass vulnerability in OpenClaw versions before 2026.4.14. It allows authenticated gateway clients who have configuration read access to retrieve sensitive information that should have been redacted. Specifically, attackers can access unredacted secrets through the sourceConfig and runtimeConfig alias fields.

  • The exposed sensitive information includes provider API keys, gateway authentication credentials, and channel secrets.

This vulnerability occurs because the redaction process does not properly remove or mask sensitive data in these alias fields, allowing unauthorized disclosure of secrets.


How can this vulnerability impact me? :

If exploited, this vulnerability can lead to unauthorized disclosure of critical secrets such as API keys and authentication credentials.

  • Attackers with config read access can obtain provider API keys, which may allow them to interact with external services or APIs maliciously.
  • Gateway authentication material exposure can enable attackers to impersonate legitimate gateway clients or gain unauthorized access.
  • Channel credentials leakage can compromise communication channels, potentially leading to further security breaches.

Overall, this vulnerability increases the risk of unauthorized access, data breaches, and potential misuse of sensitive infrastructure components.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-43528 vulnerability, you should upgrade OpenClaw to version 2026.4.14 or later, where the redaction bypass issue has been fixed.

This update ensures that sensitive information in the sourceConfig and runtimeConfig alias fields is properly redacted, preventing unauthorized access to provider API keys, gateway authentication credentials, and channel secrets.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows authenticated gateway clients to bypass redaction and access unredacted sensitive information such as provider API keys, gateway authentication credentials, and channel secrets.

Exposure of such sensitive data can lead to non-compliance with data protection regulations and standards like GDPR and HIPAA, which require proper protection and redaction of sensitive information to prevent unauthorized access.

Therefore, if exploited, this vulnerability could result in violations of these regulations due to improper handling and exposure of confidential credentials and secrets.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves authenticated gateway clients with config read access receiving unredacted sensitive information through the sourceConfig and runtimeConfig alias fields in OpenClaw versions before 2026.4.14.

To detect this vulnerability on your system, you should first verify the OpenClaw version in use. If it is prior to 2026.4.14, your system is vulnerable.

Since the vulnerability is related to configuration data exposure via specific aliases, detection involves checking if these aliases (sourceConfig and runtimeConfig) expose unredacted secrets.

There are no explicit commands provided in the resources to detect the vulnerability directly on the network or system.

However, as a general approach, you can:

  • Check the installed OpenClaw version by running a command like `openclaw --version` or inspecting package.json if using npm.
  • Review configuration outputs or logs for presence of unredacted sensitive data in sourceConfig or runtimeConfig fields if you have authenticated access.
  • Monitor network traffic for unauthorized disclosure of sensitive configuration data if possible.

The recommended mitigation is to upgrade OpenClaw to version 2026.4.14 or later, which contains the patch fixing this issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart