PT-2026-28450 · Openclaw · Openclaw
Tdjackey
·
Published
2026-03-29
·
Updated
2026-03-30
·
CVE-2026-32922
CVSS v3.1
9.9
Critical
| AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
OpenClaw versions prior to 2026.3.11
Description
OpenClaw contains a privilege escalation issue within the
device.token.rotate function. Callers possessing operator.pairing scope can generate tokens with expanded scopes, bypassing intended scope constraints. This allows attackers to obtain operator.admin tokens for paired devices, potentially leading to remote code execution via system.run or unauthorized gateway-admin access. The vulnerability stems from a failure to restrict the scope of newly created tokens to the caller’s existing permissions.Recommendations
Versions prior to 2026.3.11 should be updated to version 2026.3.11 or later.
Fix
LPE
Incorrect Privilege Assignment
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw