Before OpenClaw 2026.4.2, the Gateway connect success snapshot exposed local configPath and stateDir metadata to non-admin clients. Low-privilege authenticated clients could learn host filesystem layout and deployment details that were not needed for their role.
A non-admin client could recover host-specific filesystem paths and related deployment metadata, aiding host fingerprinting and chained attacks. This was an information-disclosure issue, not a direct authorization bypass.
openclaw (npm)<= 2026.4.1>= 2026.4.22026.4.1676b748056b5efca6f1255708e9dd9469edf5e2e — limit connect snapshot metadata to admin-scoped clientsThe fix is present on main and is staged for OpenClaw 2026.4.2. Publish this advisory after the 2026.4.2 npm release is live.
Thanks @topsec-bunney for reporting.
{
"github_reviewed": true,
"github_reviewed_at": "2026-04-07T18:15:44Z",
"cwe_ids": [
"CWE-200"
],
"severity": "MODERATE",
"nvd_published_at": null
}