๐Ÿ” CVE Alert

CVE-2026-33577

HIGH 8.1

OpenClaw < 2026.3.28 - Insufficient Scope Validation in node.pair.approve

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
1th

OpenClaw before 2026.3.28 contains an insufficient scope validation vulnerability in the node pairing approval path that allows low-privilege operators to approve nodes with broader scopes. Attackers can exploit missing callerScopes validation in node-pairing.ts to extend privileges onto paired nodes beyond their authorization level.

CWE CWE-863
Vendor openclaw
Product openclaw
Published Mar 31, 2026
Last Updated Apr 2, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new high vulnerabilities affecting openclaw openclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

OpenClaw / OpenClaw
0 < 2026.3.28

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-2x4x-cc5g-qmmg github.com: https://github.com/openclaw/openclaw/commit/4d7cc6bb4fac68b5a5fadd1c5a23168281221f34 vulncheck.com: https://www.vulncheck.com/advisories/openclaw-insufficient-scope-validation-in-node-pair-approve

Credits

๐Ÿ” AntAISecurityLab