Critical (9.8)

CVE-2026-32987: OpenClaw Privilege Escalation

CVE-2026-32987

OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during device pairing verification in src/infra/device-bootstrap.ts. Attackers can verify a valid bootstrap code multiple times be...

Overview

A critical security flaw has been discovered in OpenClaw, an open-source device management platform. This vulnerability, tracked as CVE-2026-32987, exists in the device pairing process. It allows attackers to replay valid bootstrap setup codes multiple times before administrative approval, corrupting the verification state.

Vulnerability Details

In OpenClaw versions before 2026.3.13, the device bootstrap component (src/infra/device-bootstrap.ts) does not properly invalidate a single-use bootstrap code after its initial verification check. An attacker who has intercepted or otherwise obtained a valid bootstrap code can submit it repeatedly to the system.

Each replay tricks the system into escalating the permissions associated with the pending pairing request. This flaw bypasses the intended one-time-use security of the pairing process.

Impact and Risks

The primary risk is privilege escalation. By exploiting this replay attack, a malicious actor can elevate a standard device pairing request to possess operator.admin privileges-the highest level of system control.

Successful exploitation could allow an attacker to:

  • Gain full administrative control over the OpenClaw management system.
  • Remotely manage, modify, or disconnect all connected devices.
  • Potentially use this access as a foothold to attack other networked systems.
  • Compromise the integrity of the entire device management infrastructure.

This is a critical risk for any organization using OpenClaw for operational technology (OT) or IoT device management. For context on how such vulnerabilities can lead to major incidents, historical data breach reports are available at breach reports.

Remediation and Mitigation

Immediate Action Required: The only complete remediation is to update OpenClaw to version 2026.3.13 or later. The maintainers have patched the flaw by ensuring bootstrap codes are immediately and permanently consumed after the first verification attempt.

If Immediate Patching is Not Possible:

  1. Temporary Mitigation: Review and audit all recently paired devices, especially any with administrative privileges. Be prepared to revoke suspicious sessions.
  2. Network Controls: Restrict network access to the OpenClaw bootstrap and pairing endpoints (e.g., using firewall rules) to only trusted administrative networks.
  3. Monitor Logs: Closely monitor authentication and device pairing logs for multiple verification attempts from the same source or for unusual privilege assignments.

Stay informed on emerging threats and patches by following the latest security news. Organizations relying on OpenClaw should treat this update with the highest priority due to the severity and straightforward exploitation path of this vulnerability.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.