Description
OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside the intended one-time pairing flow.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Sun, 29 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside the intended one-time pairing flow. | |
| Title | OpenClaw < 2026.3.12 - Long-lived Credential Exposure in Pairing Setup Codes | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-522 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-29T12:44:32.407Z
Reserved: 2026-03-23T11:00:48.408Z
Link: CVE-2026-33575
No data.
Status : Received
Published: 2026-03-29T13:17:03.370
Modified: 2026-03-29T13:17:03.370
Link: CVE-2026-33575
No data.
OpenCVE Enrichment
No data.
Weaknesses