Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.9

OpenClaw Gateway Token Leaked to Local Listener

GHSA-v3j7-34xh-6g3w CVE-2026-22174
Summary

A security issue in OpenClaw Gateway allows an attacker on the same local network to steal the gateway authentication token, potentially allowing them to access your account. This only affects shared-user/shared-host installs where multiple people or processes run on the same machine. To protect yourself, update OpenClaw to version 2026.2.22 or later.

What to do
  • Update steipete openclaw to version 2026.2.22.
Affected software
VendorProductAffected versionsFix available
steipete openclaw <= 2026.2.22 2026.2.22
Original title
OpenClaw versions prior to 2026.2.22 inject the x-OpenClaw-relay-token header into Chrome CDP probe traffic on loopback interfaces, allowing local processes to capture the Gateway authentication to...
Original description
OpenClaw versions prior to 2026.2.22 inject the x-OpenClaw-relay-token header into Chrome CDP probe traffic on loopback interfaces, allowing local processes to capture the Gateway authentication token. An attacker controlling a loopback port can intercept CDP reachability probes to the /json/version endpoint and reuse the leaked token as Gateway bearer authentication.
osv CVSS3.1 5.7
Vulnerability type
CWE-290
CWE-306 Missing Authentication for Critical Function
Published: 18 Mar 2026 · Updated: 18 Mar 2026 · First seen: 18 Mar 2026