Skip to content
Tech News
← Back to articles

OpenClaw privilege escalation vulnerability

read original more articles
Why This Matters

The OpenClaw privilege escalation vulnerability exposes potential security risks by allowing non-admin users to approve device requests with broader privileges, including admin access. This flaw highlights the importance of rigorous scope validation in device pairing processes to prevent unauthorized privilege escalation, which is critical for maintaining secure device management in the tech industry and safeguarding consumer data.

Key Takeaways

CVE-2026-33579 Detail Description OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes including admin access by exploiting the missing scope validation in extensions/device-pair/index.ts and src/infra/device-pairing.ts.

Metrics CVSS Version 4.0 CVSS Version 3.x CVSS Version 2.0 NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed. CVSS 4.0 Severity and Vector Strings:

NIST: NVD N/A NVD assessment not yet provided.

CNA: VulnCheck CVSS-B 8.6 HIGH Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS 3.x Severity and Vector Strings:

CNA: VulnCheck Base Score: 8.1 HIGH Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS 2.0 Severity and Vector Strings:

NIST: NVD Base Score: N/A NVD assessment not yet provided. Weakness Enumeration CWE-ID CWE Name Source CWE-863 Incorrect Authorization VulnCheck Known Affected Software Configurations Switch to CPE 2.2 CPEs loading, please wait. Denotes Vulnerable Software

Are we missing a CPE here? Please let us know.

Change History 3 change records found show changes Initial Analysis by NIST 4/01/2026 3:07:04 PM Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* versions up to (excluding) 2026.3.28

... continue reading