PT-2026-26746 · Openclaw · Openclaw
Aether Ai
·
Published
2026-03-21
·
Updated
2026-03-21
·
CVE-2026-32897
CVSS v3.1
3.7
Low
| AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
OpenClaw versions prior to 2026.2.22 reuse gateway.auth.token as a fallback hash secret for owner-ID prompt obfuscation when commands.ownerDisplay is set to hash and commands.ownerDisplaySecret is unset, creating dual-use of authentication secrets across security domains. Attackers with access to system prompts sent to third-party model providers can derive the gateway authentication token from the hash outputs, compromising gateway authentication security.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw