Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.9
OpenClaw Gateway Token Leaked to Local Listener
GHSA-v3j7-34xh-6g3w
CVE-2026-22174
Summary
A security issue in OpenClaw Gateway allows an attacker on the same local network to steal the gateway authentication token, potentially allowing them to access your account. This only affects shared-user/shared-host installs where multiple people or processes run on the same machine. To protect yourself, update OpenClaw to version 2026.2.22 or later.
What to do
- Update steipete openclaw to version 2026.2.22.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| steipete | openclaw | <= 2026.2.22 | 2026.2.22 |
Original title
OpenClaw versions prior to 2026.2.22 inject the x-OpenClaw-relay-token header into Chrome CDP probe traffic on loopback interfaces, allowing local processes to capture the Gateway authentication to...
Original description
OpenClaw versions prior to 2026.2.22 inject the x-OpenClaw-relay-token header into Chrome CDP probe traffic on loopback interfaces, allowing local processes to capture the Gateway authentication token. An attacker controlling a loopback port can intercept CDP reachability probes to the /json/version endpoint and reuse the leaked token as Gateway bearer authentication.
osv CVSS3.1
5.7
Vulnerability type
CWE-290
CWE-306
Missing Authentication for Critical Function
Published: 18 Mar 2026 · Updated: 18 Mar 2026 · First seen: 18 Mar 2026