PT-2026-28499 · Openclaw · Openclaw
Knoxar
+1
·
Published
2026-03-29
·
Updated
2026-03-29
·
CVE-2026-33575
CVSS v3.1
7.5
High
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
OpenClaw versions prior to 2026.3.12
Description
The software embeds long-lived shared gateway credentials directly within pairing setup codes. These codes are generated by the
/pair API endpoint and the OpenClaw qr command. If setup codes are leaked through chat history, logs, or screenshots, attackers can recover and reuse the credentials outside the intended one-time pairing process.Recommendations
Update to version 2026.3.12 or later.
Fix
Insufficiently Protected Credentials
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw