Impact
OpenClaw versions prior to 2026.3.22 allow attackers to gain unauthorized privileges by exploiting unbound bootstrap setup codes. The vulnerability arises because the bootstrap codes used in the first‑use pairing process are not correctly associated with the intended device roles and scopes. As a result, an attacker can perform initial pairing and then obtain higher privileges or broader scopes than the role originally intended, enabling further compromise of the device or connected services.
Affected Systems
All installations of OpenClaw whose version is older than 2026.3.22 are affected. The vulnerability applies to the OpenClaw product as delivered through its Node.js implementation.
Risk and Exploitability
The CVSS score of 9.1 indicates that this flaw presents a high risk for confidentiality and integrity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting that widespread exploitation has not yet been observed. The likely attack vector is during the first‑use device pairing process; an adversary positioned to influence the pairing event can exploit the unbound bootstrap codes to increase their privileges.
OpenCVE Enrichment