LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-32987

CVE-2026-32987 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 31, 2026

OpenClaw - Privilege Escalation

Published: March 29, 2026Updated: March 31, 2026Remote Exploitable

Overview

OpenClaw < 2026.3.13 contains a privilege escalation caused by replay of bootstrap setup codes during device pairing verification in src/infra/device-bootstrap.ts, letting attackers escalate pending pairing scopes including operator.admin privileges, exploit requires valid bootstrap code replay.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 3.9%(Probability of exploitation in next 30 days)

Impact

Attackers can escalate privileges to operator.admin by replaying bootstrap codes multiple times before approval.

Mitigation

Update to version 2026.3.13 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 29, 2026

šŸ”“ CVE-2026-32987 - Critical (9.8) OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during device pairing verification in src/infra/device-bootstrap.ts. Attackers can verify a valid bootstrap code multiple times before approval to escalate pending pairing scope... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-32987/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-32987
Severity
Critical
CVSS Score
9.8
Type
broken_access_control
Status
confirmed
EPSS
3.9%
Social Posts
1

CWE

  • CWE-294

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

3.9%Probability of exploitation in the next 30 days