Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8372-7vhw-cm6q | OpenClaw: config.get redaction bypass through sourceConfig and runtimeConfig aliases |
Wed, 06 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.14 contains a redaction bypass vulnerability that allows authenticated gateway clients to receive unredacted secrets through sourceConfig and runtimeConfig alias fields. Attackers with config read access can exploit this to obtain provider API keys, gateway authentication material, and channel credentials that should have been redacted. | |
| Title | OpenClaw < 2026.4.14 - Redaction Bypass via sourceConfig and runtimeConfig Aliases | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-212 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-06T14:11:10.945Z
Reserved: 2026-05-01T16:56:19.947Z
Link: CVE-2026-43528
Updated: 2026-05-06T14:11:06.309Z
Status : Analyzed
Published: 2026-05-05T12:16:18.917
Modified: 2026-05-07T01:54:40.293
Link: CVE-2026-43528
No data.
OpenCVE Enrichment
Updated: 2026-05-05T13:00:07Z
Github GHSA