Untriaged
Permalink
CVE-2026-32922
9.9 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
OpenClaw < 2026.3.11 - Privilege Escalation via Unvalidated Scope in device.token.rotate
OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrain newly minted scopes to the caller's current scope set. Attackers can obtain operator.admin tokens for paired devices and achieve remote code execution on connected nodes via system.run or gain unauthorized gateway-admin access.
References
-
GitHub Security Advisory (GHSA-4jpw-hj22-2xmc) third-party-advisory
Affected products
OpenClaw
- ==2026.3.11
- <2026.3.11
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>