GHSA-83f3-hh45-vfw9: OpenClaw: cleartext WebSocket exposes gateway credentials
GHSA-83f3-hh45-vfw9 MEDIUMOpenClaw's Android client (≤2026.4.1) failed to enforce TLS on remote gateway connections, transmitting stored credentials in plaintext over ws:// whenever a forged discovery beacon or crafted QR setup code redirected the client to an attacker-controlled endpoint. There is no CVSS score, EPSS data, or CISA KEV entry, and no public exploit is known — however, the 37 existing CVEs in this package signal sustained security debt, and the attack requires only network adjacency plus a spoofed beacon, a low bar in shared WiFi, hospitality, or corporate environments. AI teams running OpenClaw as a gateway client on Android should upgrade to 2026.4.2 immediately; organizations unable to patch right away should enforce network-level controls blocking cleartext ws:// and restrict gateway endpoint provisioning to trusted, authenticated sources.
Risk Assessment
Medium risk overall, elevated for AI agent deployments dependent on gateway authentication. Exploitation requires network positioning or the ability to deliver a forged discovery signal or QR code — feasible in shared network environments or via phishing. No active exploitation evidence and no public exploit reduce urgency, but stolen gateway credentials grant persistent access to AI agent sessions, enabling follow-on context manipulation or data exfiltration. The 37-CVE history of the openclaw package warrants heightened scrutiny.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | npm | <= 2026.4.1 | 2026.4.2 |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
- Upgrade openclaw to ≥2026.4.2 on all Android deployments — the fix enforces TLS for remote gateway endpoints.
- Rotate gateway credentials for any instance that may have connected over cleartext ws:// on an untrusted network.
- Audit network traffic logs for anomalous ws:// connections to non-loopback addresses from mobile OpenClaw clients.
- Enforce enterprise network policies (MDM/NAC) that block cleartext WebSocket traffic on corporate devices.
- Validate that gateway endpoint provisioning flows (discovery beacons, QR setup codes) originate from authenticated, trusted infrastructure.
- Given the 37-CVE package history, schedule a broader security review of OpenClaw's use in your AI agent stack.
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Technical Details
NVD Description
## Summary Before OpenClaw 2026.4.2, Android accepted non-loopback cleartext `ws://` gateway endpoints and would send stored gateway credentials over that connection. Discovery beacons or setup codes could therefore steer the client onto a cleartext remote endpoint. ## Impact A user who followed a forged discovery result or scanned a crafted setup code could disclose stored gateway credentials to an attacker-controlled endpoint in plaintext. This was a transport-security bug in the Android gateway client. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<= 2026.4.1` - Patched versions: `>= 2026.4.2` - Latest published npm version: `2026.4.1` ## Fix Commit(s) - `a941a4fef9bc43b2973c92d0dcff5b8a426210c5` — require TLS for remote Android gateway endpoints ## Release Process Note The fix is present on `main` and is staged for OpenClaw `2026.4.2`. Publish this advisory after the `2026.4.2` npm release is live. Thanks @zsxsoft for reporting.
Exploitation Scenario
An attacker on the same network segment as a target running unpatched OpenClaw Android broadcasts a forged mDNS/discovery beacon advertising a malicious cleartext ws:// gateway endpoint, or delivers a crafted QR setup code via phishing or physical social engineering. The victim's OpenClaw client, lacking TLS enforcement, connects to the attacker's endpoint and transmits stored gateway credentials in plaintext. The attacker captures these credentials and uses them to authenticate to the legitimate gateway, gaining persistent access to the victim's AI agent sessions — enabling them to inject malicious instructions into agent context, intercept sensitive data processed by the agent, or use the gateway as a pivot point into downstream AI infrastructure.
References
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert