Impact
The flaw resides in the device pairing approval API, where the system fails to forward the caller's scopes into the approval logic. A user who has permissive pairing rights but lacks administrative privileges can trigger the /pair approve endpoint to grant requests that request broader scopes, including administrative access. This permits the attacker to elevate privileges within the OpenClaw instance, potentially gaining full administrative control over configuration and data.
Affected Systems
The vulnerability affects the OpenClaw application across all releases prior to version 2026.3.28. Users running any older build of OpenClaw are susceptible. The affected components are extensions/device-pair/index.ts and src/infra/device-pairing.ts.
Risk and Exploitability
The CVSS base score of 8.6 indicates a high severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited public exploitation yet. Exploitation requires the attacker to have valid pairing permissions; once that is obtained, an authenticated request to /pair approve can be crafted to request admin-level scopes. Attack is likely remote via API access but would need an authenticated session.
OpenCVE Enrichment