Skip to content
CVSS 7.8 · HIGH

CVE-2026-42432

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability allowing previously paired nodes to reconnect with exec-capable commands without operator.admin scope requirement. Attackers can bypass re-pairing authentication to execute privileged commands on the local assistant system.

View on NVD

Analysis

OpenClaw is a specialized automation or assistant platform with limited adoption in the general developer community. While the privilege escalation vulnerability allows unauthorized command execution on the host, the product is not widely used enough to warrant a community-wide alert.

Severity

Score: 7.8(HIGH)
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: LOCAL
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-863

EPSS

Probability of exploitation (next 30 days): 0.0002 (0.0%)
Percentile: 6.5%
EPSS: 2026-05-06

Affects

openclaw:openclaw

Technical description

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability allowing previously paired nodes to reconnect with exec-capable commands without operator.admin scope requirement. Attackers can bypass re-pairing authentication to execute privileged commands on the local assistant system.

Published: 4/28/2026, 7:37:47 PM
Last modified: 4/30/2026, 2:06:17 PM

References

HomeEventsBlogResourcesTeam