Impact
OpenClaw versions prior to 2026.3.28 allow users with only low‑privilege authority to approve nodes for which they lack the necessary scope. The flaw stems from missing validation of the callerScopes field in node-pairing.ts, enabling an operator to grant broader permissions to paired nodes than the operator is authorized to use. This weakness, classified as CWE‑863, effectively permits a user to elevate privileges within the system by manipulating node scopes.
Affected Systems
The affected product is OpenClaw OpenClaw. Any installation using a build dated before the 2026.3.28 release is vulnerable; no narrower version list is provided in the advisory.
Risk and Exploitability
The vulnerability scores a high CVSS score of 8.6. EPSS data is not supplied and the issue is not listed in CISA’s KEV catalog, indicating no publicly known exploitation. The likely attack vector requires the attacker to have legitimate access to the application’s node pairing interface, a low‑privilege operator role, and the ability to submit approval requests. Once the flaw is used, the attacker can grant themselves or others permissions beyond their authorization level, potentially compromising confidentiality, integrity, or availability of the affected nodes.
OpenCVE Enrichment
Github GHSA