PT-2026-28499 · Openclaw · Openclaw

Knoxar

+1

·

Published

2026-03-29

·

Updated

2026-03-29

·

CVE-2026-33575

CVSS v3.1

7.5

High

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Name of the Vulnerable Software and Affected Versions OpenClaw versions prior to 2026.3.12
Description The software embeds long-lived shared gateway credentials directly within pairing setup codes. These codes are generated by the /pair API endpoint and the OpenClaw qr command. If setup codes are leaked through chat history, logs, or screenshots, attackers can recover and reuse the credentials outside the intended one-time pairing process.
Recommendations Update to version 2026.3.12 or later.

Fix

Insufficiently Protected Credentials

Weakness Enumeration

Related Identifiers

CVE-2026-33575

Affected Products

Openclaw