CVE-2026-35639 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: April 9, 2026
OpenClaw - Privilege Escalation
Published: April 9, 2026Updated: April 9, 2026Remote Exploitable
Overview
OpenClaw < 2026.3.22 contains a privilege escalation caused by insufficient scope validation in device.pair.approve method, letting operator.pairing approvers escalate privileges to operator.admin and execute remote code, exploit requires operator.pairing approver privileges.
Severity & Score
Severity: High
CVSS Score: 8.8
Impact
Attackers can escalate privileges to operator.admin and execute remote code on Node infrastructure, leading to full system compromise.
Mitigation
Update to version 2026.3.22 or later.
References
- https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87
- https://github.com/openclaw/openclaw/commit/fc2d29ea926f47c428c556e92ec981441228d2a4
- https://github.com/openclaw/openclaw/security/advisories/GHSA-hf68-49fm-59cq
- https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-device-pair-approve-scope-validation
Related Resources
Details
- CVE ID
- CVE-2026-35639
- Severity
- High
- CVSS Score
- 8.8
- Type
- broken_access_control
- Status
- new
CWE
- CWE-648
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H