Impact
OpenClaw before 2026.3.25 permits privilege escalation by allowing non‑admin operators to self‑request a broader scope during backend reconnect. Attackers can bypass ownership pairing to reconnect as operator.admin and thus acquire unauthorized administrative privileges. This flaw stems from insufficient permission checks in the backend reconnection logic, a weakness reflected in CWE‑648.
Affected Systems
The vulnerability impacts all OpenClaw deployments running a Node.js environment with any version earlier than 2026.3.25. No specific distribution variants are indicated beyond the generic OpenClaw package.
Risk and Exploitability
The vulnerability has a CVSS score of 8.7, indicating high severity, and is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires an attacker to first obtain at least a non‑admin operator role that triggers a backend reconnect. Based on the description, the likely attack vector is a local or remote attacker that can create or elevate a non‑admin session and then manipulate backend reconnect scope requests.
OpenCVE Enrichment
Github GHSA