Skip to content
Tech News
← Back to articles

If you're running OpenClaw, you probably got hacked in the last week

read original get OpenClaw Cybersecurity Kit → more articles
Why This Matters

The recent vulnerability in OpenClaw, CVE-2026-33579, exposes over 135,000 instances to easy and rapid takeover by malicious actors, highlighting critical security gaps in IoT device management. This underscores the urgent need for timely patching and improved security protocols in connected devices to protect consumer and enterprise data. The incident serves as a stark reminder of the risks associated with unpatched vulnerabilities in widely deployed IoT systems.

Key Takeaways

CVE-2026-33579 is actively exploitable and hits hard.

What happened: The /pair approve command doesn't check who is approving. So someone with basic pairing access (the lowest permission tier) can approve themselves for admin. That's it. Full instance takeover, no secondary exploit needed. CVSS 8.6 HIGH.

Why this matters right now:

Patch dropped March 29, NVD listing March 31. Two-day window for the vulns to spread before anyone saw it on NVD

135k+ OpenClaw instances are publicly exposed

63% of those run zero authentication. Meaning the "low privilege required" in the CVE = literally anyone on the internet can request pairing access and start the exploit chain

The attack is trivial:

Connect to an unauthenticated OpenClaw instance → get pairing access (no credentials needed) Register a fake device asking for operator.admin scope Approve your own request with /pair approve [request-id] System grants admin because it never checks if you are authorized to grant admin You now control the entire instance — all data, all connected services, all credentials

Takes maybe 30 seconds once you know the gap exists.

What you need to do: