Skip to content
CVSS 8.8 · HIGH

CVE-2026-42426

OpenClaw before 2026.4.8 contains an improper authorization vulnerability where the node.pair.approve method accepts operator.write scope instead of the narrower operator.pairing scope, allowing unprivileged users to approve node pairing. Attackers with operator.write permissions can bypass pairing approval restrictions to gain unauthorized access to exec-capable nodes.

View on NVD

Analysis

OpenClaw is a niche orchestration tool and this vulnerability allows unprivileged users to approve node pairing, potentially leading to unauthorized access to exec-capable nodes. While the security impact is high, the software is not part of the common stack used by the majority of the community.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-863

EPSS

Probability of exploitation (next 30 days): 0.0004 (0.0%)
Percentile: 10.4%
EPSS: 2026-05-06

Affects

openclaw:openclaw

Technical description

OpenClaw before 2026.4.8 contains an improper authorization vulnerability where the node.pair.approve method accepts operator.write scope instead of the narrower operator.pairing scope, allowing unprivileged users to approve node pairing. Attackers with operator.write permissions can bypass pairing approval restrictions to gain unauthorized access to exec-capable nodes.

Published: 4/28/2026, 7:37:46 PM
Last modified: 4/30/2026, 2:05:07 PM

References

HomeEventsBlogResourcesTeam