/ data / vuln_en / openclaw / GHSA-553v-f69r-656j.yaml
GHSA-553v-f69r-656j.yaml
 1  info:
 2    name: OpenClaw
 3    cve: GHSA-553v-f69r-656j
 4    summary: OpenClaw Unpaired device identity can bypass operator pairing and self-assign operator scopes with shared auth
 5    details: >-
 6      Summary
 7  
 8      A client using shared gateway auth could attach an unpaired device identity and request elevated operator scopes (including
 9      operator.admin) before pairing approval, enabling privilege escalation.
10  
11  
12      Impact
13  
14      Attackers with valid shared gateway auth could self-assign higher operator scopes by presenting a self-signed, unpaired
15      device identity.
16  
17  
18      Affected Packages / Versions
19  
20      - Package: openclaw (npm)
21  
22      - Affected: >= 2026.2.22 <= 2026.2.24
23  
24      - Latest published npm at triage time: 2026.2.24
25  
26      - Planned patched release: 2026.2.25
27  
28  
29      Remediation
30  
31      Require pairing for operator device-identity sessions authenticated with shared token/password auth (except existing control-ui
32      trusted-proxy/control-ui bypass policy paths).
33    cvss: ''
34    severity: MEDIUM
35    security_advise: Upgrade openclaw to >= 2026.2.25 or later. Commit(s) - 8d1481cb4a9d31bd617e52dc8c392c35689d9dea
36    references:
37    - https://github.com/openclaw/openclaw/security/advisories/GHSA-553v-f69r-656j
38  rule: version >= "2026.2.22" && version <= "2026.2.24"
39  references:
40  - https://github.com/openclaw/openclaw/security/advisories/GHSA-553v-f69r-656j