Impact
OpenClaw versions prior to 2026.3.13 allow attackers to replay bootstrap setup codes during device pairing verification. By repeatedly submitting a valid bootstrap code before its approval, an attacker can manipulate the pending pairing scope and elevate privileges up to the operator.admin level. The weakness stems from improper authorization handling (CWE-294) and results in a severe breach of integrity and privilege boundaries.
Affected Systems
The affected product is OpenClaw software from the vendor OpenClaw. Any installation running a version older than 2026.3.13 is vulnerable. The vulnerability exists in the device-bootstrap.ts module of the Node.js runtime used by the OpenClaw application.
Risk and Exploitability
The CVSS score of 9.3 classifies this as Critical, indicating a high likelihood of successful exploitation if an attacker can trigger the device pairing flow. The EPSS score is unavailable, and the vulnerability is not listed in the CISA KEV catalog, but the lack of a known exploit does not reduce its severity. Based on the description, it is inferred that an attacker could exploit the flaw remotely by initiating a pairing session, or locally if able to control a device during its setup process.
OpenCVE Enrichment