CVE-2026-35638

OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the Control UI that allows unauthenticated sessions to retain self-declared privileged scopes without device identity verification. Attackers can exploit the device-less allow path in the trusted-proxy mechanism to maintain elevated permissions by declaring arbitrary scopes, bypassing device identity requirements.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

15 Apr 2026, 16:52

Type Values Removed Values Added
First Time Openclaw openclaw
Openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
References () https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87 - () https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87 - Patch
References () https://github.com/openclaw/openclaw/commit/ccf16cd8892402022439346ae1d23352e3707e9e - () https://github.com/openclaw/openclaw/commit/ccf16cd8892402022439346ae1d23352e3707e9e - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-48vw-m3qc-wr99 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-48vw-m3qc-wr99 - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-self-declared-scopes-in-trusted-proxy-control-ui - () https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-self-declared-scopes-in-trusted-proxy-control-ui - Third Party Advisory

09 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-09 22:16

Updated : 2026-04-15 16:52


NVD link : CVE-2026-35638

Mitre link : CVE-2026-35638

CVE.ORG link : CVE-2026-35638


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-286

Incorrect User Management