Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. openclaw
  4. ›
  5. CVE-2026-42421

CVE-2026-42421: OpenClaw: Existing WS sessions survive shared gateway token rotation

April 9, 2026 (updated April 28, 2026)

Existing WS sessions survive shared gateway token rotation.

Rotating the shared gateway token did not disconnect existing shared-token WebSocket sessions.

OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary.

References

  • github.com/advisories/GHSA-5h3f-885m-v22w
  • github.com/openclaw/openclaw
  • github.com/openclaw/openclaw/security/advisories/GHSA-5h3f-885m-v22w
  • nvd.nist.gov/vuln/detail/CVE-2026-42421

Code Behaviors & Features

Detect and mitigate CVE-2026-42421 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2026.4.8

Fixed versions

  • 2026.4.8

Solution

Upgrade to version 2026.4.8 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-613: Insufficient Session Expiration

Source file

npm/openclaw/CVE-2026-42421.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:05 +0000.