Impact
The vulnerability is a privilege escalation flaw in the device.token.rotate endpoint of OpenClaw. Callers who possess operator.pairing scope can mint new tokens without the system enforcing the scope limits of the caller. As a result, an attacker can create tokens with broader scopes, including operator.admin, and gain elevated privileges. With operator.admin tokens, the attacker can remotely execute arbitrary commands on connected nodes via the system.run capability or gain unauthorized access to gateway administration functions. This weakness is classified as a Permissions Management Error (CWE-266).
Affected Systems
The affected product is OpenClaw. Versions below 2026.3.11 contain the flaw; upgrading to 2026.3.11 or later resolves the issue.
Risk and Exploitability
The flaw carries a CVSS score of 9.4, indicating critical severity. Although EPSS data is unavailable, the high score suggests that exploitation is feasible if an attacker can reach the device.token.rotate function. An attacker does not need to compromise the device directly; possessing operator.pairing scope is sufficient to elevate privileges. The vulnerability is not listed as a Known Exploited Vulnerability, but the severity presents a significant risk to any environment where OpenClaw is deployed, especially if devices connect over insecure networks.
OpenCVE Enrichment