Skip to content
CVSS 8.8 · HIGH

CVE-2026-42422

OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function that allows minting tokens for unapproved roles. Attackers can bypass device role-upgrade pairing to preserve or mint roles and scopes that had not undergone intended approval.

View on NVD

Analysis

OpenClaw appears to be a niche device management or utility project rather than a widely used piece of infrastructure or dev tooling. While the auth bypass is severe for its users, it does not meet the threshold for general community interest in the MexicoDev stack.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-863

EPSS

Probability of exploitation (next 30 days): 0.0004 (0.0%)
Percentile: 13.1%
EPSS: 2026-05-06

Affects

openclaw:openclaw

Technical description

OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function that allows minting tokens for unapproved roles. Attackers can bypass device role-upgrade pairing to preserve or mint roles and scopes that had not undergone intended approval.

Published: 4/28/2026, 7:37:45 PM
Last modified: 4/30/2026, 2:04:50 PM

References

HomeEventsBlogResourcesTeam