Impact
OpenClaw before 2026.4.8 permits a vulnerability that lets a previously paired node reconnect and issue privileged, exec‑capable commands without requiring the operator.admin scope. This missing authority check allows an attacker who controls a node that has already been paired to elevate privileges on the local assistant system, potentially executing arbitrary commands, modifying data, or disrupting services. The flaw is a direct privilege escalation via an unstated scope enforcement failure, identified as CWE‑863.
Affected Systems
All installations of OpenClaw running a version earlier than 2026.4.8 are affected. The vulnerability applies to the OpenClaw application that runs on the node.js platform and uses its pairing feature to accept new connections from previously paired nodes.
Risk and Exploitability
The CVSS score of 7.3 classifies this issue as high severity. No EPSS data is available, indicating uncertainty about current exploitation rates, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector requires the attacker to own or compromise a node that has already been paired with the target system; once that node is able to initiate a reconnection, the attacker can execute privileged commands without additional authentication.
OpenCVE Enrichment