OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a...
High severity
Unreviewed
Published
Mar 21, 2026
to the GitHub Advisory Database
•
Updated Mar 21, 2026
Description
Published by the National Vulnerability Database
Mar 21, 2026
Published to the GitHub Advisory Database
Mar 21, 2026
Last updated
Mar 21, 2026
OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a privilege escalation vulnerability allowing unpaired device identities to bypass operator pairing requirements and self-assign elevated operator scopes including operator.admin. Attackers with valid shared gateway authentication can present a self-signed unpaired device identity to request and obtain higher operator scopes before pairing approval is granted.
References