CVE-2026-32987: OpenClaw Privilege Escalation
CVE-2026-32987
OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during device pairing verification in src/infra/device-bootstrap.ts. Attackers can verify a valid bootstrap code multiple times be...
Overview
A critical security flaw has been discovered in OpenClaw, an open-source device management platform. This vulnerability, tracked as CVE-2026-32987, exists in the device pairing process. It allows attackers to replay valid bootstrap setup codes multiple times before administrative approval, corrupting the verification state.
Vulnerability Details
In OpenClaw versions before 2026.3.13, the device bootstrap component (src/infra/device-bootstrap.ts) does not properly invalidate a single-use bootstrap code after its initial verification check. An attacker who has intercepted or otherwise obtained a valid bootstrap code can submit it repeatedly to the system.
Each replay tricks the system into escalating the permissions associated with the pending pairing request. This flaw bypasses the intended one-time-use security of the pairing process.
Impact and Risks
The primary risk is privilege escalation. By exploiting this replay attack, a malicious actor can elevate a standard device pairing request to possess operator.admin privileges-the highest level of system control.
Successful exploitation could allow an attacker to:
- Gain full administrative control over the OpenClaw management system.
- Remotely manage, modify, or disconnect all connected devices.
- Potentially use this access as a foothold to attack other networked systems.
- Compromise the integrity of the entire device management infrastructure.
This is a critical risk for any organization using OpenClaw for operational technology (OT) or IoT device management. For context on how such vulnerabilities can lead to major incidents, historical data breach reports are available at breach reports.
Remediation and Mitigation
Immediate Action Required: The only complete remediation is to update OpenClaw to version 2026.3.13 or later. The maintainers have patched the flaw by ensuring bootstrap codes are immediately and permanently consumed after the first verification attempt.
If Immediate Patching is Not Possible:
- Temporary Mitigation: Review and audit all recently paired devices, especially any with administrative privileges. Be prepared to revoke suspicious sessions.
- Network Controls: Restrict network access to the OpenClaw bootstrap and pairing endpoints (e.g., using firewall rules) to only trusted administrative networks.
- Monitor Logs: Closely monitor authentication and device pairing logs for multiple verification attempts from the same source or for unusual privilege assignments.
Stay informed on emerging threats and patches by following the latest security news. Organizations relying on OpenClaw should treat this update with the highest priority due to the severity and straightforward exploitation path of this vulnerability.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 12 (JumpToUser) accepts an arbitrary entry point address from user-space registers witho...
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 15 (MemoryMapRange) allows Ring 3 user-mode processes to map arbitrary virtual address r...
OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerability in the Slack slash-command handler that incorrectly authorizes any direct message sender when dmPolicy is set to open ...
The Listee theme for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.1.6. This is due to a broken validation check in the bundled listee-core plugin's user regi...