Impact
A flaw exists in OpenClaw's Control UI that permits any unauthenticated session to declare and retain privileged scopes, bypassing the required device identity checks. This vulnerability enables an attacker to continue operating with elevated permissions, potentially granting full control over the device’s functionality. The weakness aligns with CWE‑286, which involves the failure to properly authenticate, authorize, or validate user actions.
Affected Systems
OpenClaw versions earlier than 2026.3.22 are affected. The product is the OpenClaw platform, and no narrower version sub‑ranges are listed for this issue.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity level. EPSS data is not available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, suggesting it has not yet been widely exploited. Nonetheless, attackers can likely exploit the device‑less allow path in the trusted‑proxy mechanism through the Control UI, making it a significant risk for environments that expose this interface without proper authentication.
OpenCVE Enrichment