Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-83f3-hh45-vfw9 | OpenClaw: Android accepted cleartext remote gateway endpoints and sent stored credentials over ws:// |
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.2 accepts non-loopback cleartext ws:// gateway endpoints and transmits stored gateway credentials over unencrypted connections. Attackers can forge discovery results or craft setup codes to redirect clients to malicious endpoints, disclosing plaintext gateway credentials. | |
| Title | OpenClaw < 2026.4.2 - Cleartext Credential Transmission via Unencrypted WebSocket Gateway Endpoints | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-319 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-21T13:37:43.951Z
Reserved: 2026-04-08T13:39:22.100Z
Link: CVE-2026-40045
Updated: 2026-04-21T13:37:40.313Z
Status : Analyzed
Published: 2026-04-21T00:16:29.300
Modified: 2026-04-24T19:03:59.463
Link: CVE-2026-40045
No data.
OpenCVE Enrichment
Updated: 2026-04-21T23:30:02Z
Github GHSA