CVE-2026-32922

OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrain newly minted scopes to the caller's current scope set. Attackers can obtain operator.admin tokens for paired devices and achieve remote code execution on connected nodes via system.run or gain unauthorized gateway-admin access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

31 Mar 2026, 18:02

Type Values Removed Values Added
First Time Openclaw openclaw
Openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-4jpw-hj22-2xmc - () https://github.com/openclaw/openclaw/security/advisories/GHSA-4jpw-hj22-2xmc - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-unvalidated-scope-in-device-token-rotate - () https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-unvalidated-scope-in-device-token-rotate - Third Party Advisory

29 Mar 2026, 13:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-29 13:17

Updated : 2026-03-31 18:02


NVD link : CVE-2026-32922

Mitre link : CVE-2026-32922

CVE.ORG link : CVE-2026-32922


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-266

Incorrect Privilege Assignment