OpenClaw privilege escalation to admin (CVE-2026-32922)
CVE-2026-32922
OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrai...
Overview
A critical privilege escalation vulnerability has been discovered in OpenClaw, a device management platform. Tracked as CVE-2026-32922, this flaw resides in the device.token.rotate function. It allows an authenticated user with limited permissions to create new authentication tokens with significantly broader, unauthorized access rights.
Vulnerability Explained
In simple terms, the system fails to properly check permissions when generating new tokens. An attacker with the basic operator.pairing scope-a standard low-level permission for linking devices-can exploit this flaw. The vulnerability does not restrict newly minted tokens to the caller’s existing permissions. Consequently, an attacker can craft a token with the powerful operator.admin scope, effectively granting them full administrative control over paired devices and the broader system.
Potential Impact
The impact of this vulnerability is severe. Successful exploitation enables an attacker to:
- Gain full administrative control (
operator.admin) over any device they have paired with. - Execute arbitrary commands on connected nodes via the
system.runfunction, leading to remote code execution (RCE). - Obtain unauthorized
gateway-adminaccess to central management gateways. - Potentially move laterally across a network, compromise sensitive data, and disrupt critical operations. This level of access mirrors a complete system takeover.
For context on how such vulnerabilities can lead to real-world incidents, recent data breach reports are available at breach reports.
Remediation and Mitigation
Immediate action is required to protect affected systems.
Primary Remediation: The only complete fix is to upgrade OpenClaw to version 2026.3.11 or later. This update corrects the scope validation logic in the token rotation process. All organizations using OpenClaw should prioritize this update.
Temporary Mitigation (If Immediate Patching is Not Possible):
- Audit and Monitor: Immediately review audit logs for any unusual token generation or privilege escalation activities, particularly from accounts with
operator.pairingscope. - Restrict Pairing: Temporarily limit the assignment of the
operator.pairingscope to only absolutely essential, trusted personnel and devices. - Network Segmentation: Ensure OpenClaw management interfaces are not exposed to the public internet and are placed within a secured network segment.
Stay informed about critical vulnerabilities and patches by following the latest security news. Do not delay in applying the official patch, as this vulnerability is highly exploitable and poses a critical risk to system integrity and security.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Incorrect Privilege Assignment vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Privilege Escalation.This issue affects Woocommerce Wholesale Lead Capture: from n/a th...
A flaw has been found in SourceCodester Client Database Management System 1.0. Affected is an unknown function of the file /fetch_manager_details.php of the component Endpoint. This manipulation of th...
A security vulnerability has been detected in perfree go-fastdfs-web up to 1.3.7. This affects an unknown part of the file src/main/java/com/perfree/controller/InstallController.java of the component ...
A vulnerability has been found in zhanghuanhao LibrarySystem 图书馆管理系统 up to 1.1.1. This impacts an unknown function of the file BookController.java. The manipulation leads to improper access controls. ...