| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8372-7vhw-cm6q | OpenClaw: config.get redaction bypass through sourceConfig and runtimeConfig aliases |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 06 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.14 contains a redaction bypass vulnerability that allows authenticated gateway clients to receive unredacted secrets through sourceConfig and runtimeConfig alias fields. Attackers with config read access can exploit this to obtain provider API keys, gateway authentication material, and channel credentials that should have been redacted. | |
| Title | OpenClaw < 2026.4.14 - Redaction Bypass via sourceConfig and runtimeConfig Aliases | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-212 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-06T14:11:10.945Z
Reserved: 2026-05-01T16:56:19.947Z
Link: CVE-2026-43528
Updated: 2026-05-06T14:11:06.309Z
Status : Analyzed
Published: 2026-05-05T12:16:18.917
Modified: 2026-05-07T01:54:40.293
Link: CVE-2026-43528
No data.
OpenCVE Enrichment
Updated: 2026-05-05T13:00:07Z
Github GHSA