OpenClaw: Silent privilege escalation via gateway shared-auth reconnect
Critical severity
GitHub Reviewed
Published
Mar 26, 2026
in
openclaw/openclaw
•
Updated Mar 27, 2026
Description
Published to the GitHub Advisory Database
Mar 27, 2026
Reviewed
Mar 27, 2026
Last updated
Mar 27, 2026
Summary
Gateway local shared-auth reconnect silently widens paired device scope from operator.read to operator.admin and reach node RCE
Affected Packages / Versions
openclaw<= 2026.3.242026.3.252026.3.24Details
Silent local shared-auth reconnects could previously auto-approve
scope-upgraderequests and widen a paired device fromoperator.readtooperator.admin. Commit81ebc7e0344fd19c85778e883bad45e2da972229blocks silent reconnect scope upgrades so widened scopes require an explicit pairing approval instead of an implicit local reconnect path.Verified vulnerable on tag
v2026.3.24and fixed onmainby commit81ebc7e0344fd19c85778e883bad45e2da972229.Fix Commit(s)
81ebc7e0344fd19c85778e883bad45e2da972229References