GHSA-47Q7-97XP-M272: Cleartext Credential Exposure via Configuration Persistence in OpenClaw
Vulnerability ID: GHSA-47Q7-97XP-M272
CVSS Score: 7.4
Published: 2026-03-02
A critical information disclosure vulnerability exists in the OpenClaw AI assistant's configuration management subsystem. When processing configuration files that utilize environment variable interpolation (e.g., ${API_KEY}), certain write operations—such as updates or repairs—inadvertently resolve these references to their runtime values and persist the cleartext secrets back to the disk. This effectively converts ephemeral, secure configuration references into permanent, plaintext credentials stored within openclaw.json, significantly increasing the risk of accidental secret leakage via version control or backup mechanisms.
TL;DR
Running maintenance commands like openclaw doctor or update silently replaces secure environment variable placeholders (e.g., ${KEY}) in your config file with the actual cleartext secret values, permanently writing them to disk.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-312
- Vulnerability Type: Information Disclosure
- Attack Vector: Local / File System
- Impact: Confidentiality Loss
- Affected Component: Config I/O (openclaw.json)
- CVSS Score: 7.4 (High)
Affected Systems
- OpenClaw Personal AI Assistant
- OpenClaw CLI Tools
-
OpenClaw: <= v2026.2.6-3 (Fixed in:
v2026.2.7)
Code Analysis
Commit: 4900
fix(doctor): preserve ${VAR} env var references when writing config
Mitigation Strategies
- Upgrade to patched software version
- Secret rotation
- Configuration auditing
- Version control exclusion
Remediation Steps:
- Upgrade OpenClaw to version v2026.2.7 or higher.
- Inspect
openclaw.jsonfor any cleartext API keys or tokens. - If keys are found, revoke and rotate them immediately via the respective provider (OpenAI, Anthropic, etc.).
- Restore the
${VAR_NAME}syntax inopenclaw.json. - Ensure
openclaw.jsonis listed in.gitignoreto prevent accidental commits.
References
Read the full report for GHSA-47Q7-97XP-M272 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)