CVE-2026-33579 Detail Description OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes including admin access by exploiting the missing scope validation in extensions/device-pair/index.ts and src/infra/device-pairing.ts.
Metrics CVSS Version 4.0 CVSS Version 3.x CVSS Version 2.0 NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed. CVSS 4.0 Severity and Vector Strings:
NIST: NVD N/A NVD assessment not yet provided.
CNA: VulnCheck CVSS-B 8.6 HIGH Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS 3.x Severity and Vector Strings:
CNA: VulnCheck Base Score: 8.1 HIGH Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS 2.0 Severity and Vector Strings:
NIST: NVD Base Score: N/A NVD assessment not yet provided. Weakness Enumeration CWE-ID CWE Name Source CWE-863 Incorrect Authorization VulnCheck Known Affected Software Configurations Switch to CPE 2.2 CPEs loading, please wait. Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.
Change History 3 change records found show changes Initial Analysis by NIST 4/01/2026 3:07:04 PM Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* versions up to (excluding) 2026.3.28
... continue reading