Report: CVE-2026-42421 - OpenClaw < 2026.4.8 - WebSocket Session Persistence via Shared Gateway Token Rot

Report: CVE-2026-42421 - OpenClaw < 2026.4.8 - WebSocket Session Persistence via Shared Gateway Token Rot

CVE ID :CVE-2026-42421 Published : April 28, 2026, 7:37 p.m. | 1 hour, 2 minutes ago Description :OpenClaw before 2026.4.8 contains a session management vulnerability where existing WebSocket sessions survive shared gateway token rotation. Attackers can maintain unauthorized access to WebSocket connections after token rotation by exploiting the failure to disconnect existing shared-token sessions. Severity: 5.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
MEDIUM
Published
April 28, 2026