Impact
OpenClaw versions 2026.2.22 through 2026.2.24 allow an attacker to elevate privileges by using an unpaired device identity. The flaw lets a device that has not completed the official pairing process request and receive elevated operator scopes, including operator.admin, before the operator pairing approval is granted. This can give an attacker full control over the OpenClaw system.
Affected Systems
The vulnerability affects OpenClaw software from the vendor OpenClaw. All installations running a version earlier than 2026.2.25 are susceptible, including the 2026.2.22, 2026.2.23, and 2026.2.24 releases.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity. An attacker must possess valid shared gateway authentication credentials to exploit the flaw; the attack is therefore likely limited to users who can obtain or guess these credentials. EPSS data is not available, and the vulnerability is not currently listed in the CISA KEV catalog. Still, the ability to grant admin rights without proper pairing approval makes this a serious risk for any environment using the affected OpenClaw versions.
OpenCVE Enrichment