Impact
A caller with pairing privileges but not administrative rights can approve pending device pairing requests that request broader scopes, including admin access. The vulnerability is due to missing forwarding of caller scopes into the core approval check—a flaw characterized by CWE‑863, which describes improper validation of authorization permissions. An attacker can thus upgrade the permissions of a device or user without possessing full admin rights, leading to unauthorized elevation of authority.
Affected Systems
The OpenClaw application built for a Node.js runtime is affected. All releases prior to version 2026.3.28 are vulnerable; this includes the package identified by the provided CPE name. No other products or vendors are listed as impacted.
Risk and Exploitability
The flaw carries a CVSS score of 9.4 and a very low exploitation probability, with an EPSS score below 1 %. It does not appear in the CISA KEV catalog. Based on the description, the likely attack vector is remote: an authenticated request to the /pair approve API path by a user who has pairing privileges but lacks admin rights can trigger the escalation.
OpenCVE Enrichment
Github GHSA