GHSA-5h3f-885m-v22w: OpenClaw: Existing WS sessions survive shared gateway token rotation
Summary
OpenClaw, a local AI assistant, had a security flaw where WebSocket sessions (persistent connections that allow real-time communication between a client and server) using a shared gateway token remained active even after the token was rotated (changed to a new one). This meant that even after administrators changed the authentication token, old sessions could continue operating without re-authenticating.
Solution / Mitigation
Update OpenClaw to version 2026.4.8 or later. The fix is available in the npm package and has been verified in commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5 on the main branch.
Classification
Affected Vendors
Affected Packages
Related Issues
Original source: https://github.com/advisories/GHSA-5h3f-885m-v22w
First tracked: April 9, 2026 at 02:00 PM
Classified by LLM (prompt v3) · confidence: 75%