Description
OpenClaw before 2026.4.8 contains a privilege escalation vulnerability allowing previously paired nodes to reconnect with exec-capable commands without operator.admin scope requirement. Attackers can bypass re-pairing authentication to execute privileged commands on the local assistant system.
Problem types
CWE-863: Incorrect Authorization
Product status
Any version before 2026.4.8
2026.4.8 (semver)
Credits
zsx (@zsxsoft)
KeenSecurityLab
References
github.com/...enclaw/security/advisories/GHSA-5wj5-87vq-39xm (GitHub Security Advisory (GHSA-5wj5-87vq-39xm))
github.com/...ommit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5 (Patch Commit)
www.vulncheck.com/...ation-via-node-pairing-reconnect-bypass (VulnCheck Advisory: OpenClaw < 2026.4.8 - Command Escalation via Node Pairing Reconnect Bypass)