OpenClaw 权限提升漏洞
OpenClaw privilege escalation vulnerability

原始链接: https://nvd.nist.gov/vuln/detail/CVE-2026-33579

OpenClaw 2026.3.28 之前的版本包含一个与设备配对相关的权限提升漏洞。具体来说,`/pair approve` 命令路径未正确验证用户权限,允许具有配对权限但*没有*管理员访问权限的用户批准设备请求,从而授予更广泛的访问权限,甚至包括管理员级别的访问权限。 此缺陷源于 `extensions/device-pair/index.ts` 和 `src/infra/device-pairing.ts` 文件中缺少范围验证。成功利用可能允许未经授权的用户获得更高的权限。该漏洞被追踪为 CWE-863(不正确的授权)。 OpenClaw 项目已通过提交 (e403decb6e20091b5402780a7ccd2085f98aa3cd) 和安全公告 (GHSA-hc5h-pmr3-3497) 提供了补丁,并在 VulnCheck.com 上进行了详细说明。建议用户升级到 2026.3.28 版本或更高版本以减轻此风险。

## OpenClaw 漏洞摘要 OpenClaw,一个AI代理框架,被发现存在权限提升漏洞。该漏洞并非完全控制系统,但允许已拥有网关访问权限的客户端,通过批准具有更广泛权限的设备请求来提升权限至“operator.admin”。 估计有135,000个公开暴露的实例受到影响,其中63%未启用身份验证,显著增加了风险。 OpenClaw的创建者澄清,该漏洞的利用范围并不像最初担心的那样广泛,需要预先存在的访问权限。 然而,人们仍然担心该项目的安全实践以及潜在的滥用,特别是考虑到它的受欢迎程度以及用户绕过安全功能的容易程度。 该事件凸显了快速开发的AI工具的风险以及对健全安全措施的需求。 讨论围绕责任、项目开发过程以及收益是否超过固有的安全风险展开。 许多用户正在采用缓解策略,例如在沙盒环境中运行OpenClaw或使用有限的用户帐户。
相关文章

原文

Description

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes including admin access by exploiting the missing scope validation in extensions/device-pair/index.ts and src/infra/device-pairing.ts.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.

CVSS 4.0 Severity and Vector Strings:
CVSS 3.x Severity and Vector Strings:
CVSS 2.0 Severity and Vector Strings:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-863 Incorrect Authorization VulnCheck  

Change History

3 change records found show changes

Initial Analysis by NIST 4/01/2026 3:07:04 PM

Action Type Old Value New Value
Added CPE Configuration
OR
          *cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* versions up to (excluding) 2026.3.28
Added Reference Type
VulnCheck: https://github.com/openclaw/openclaw/commit/e403decb6e20091b5402780a7ccd2085f98aa3cd Types: Patch
Added Reference Type
VulnCheck: https://github.com/openclaw/openclaw/security/advisories/GHSA-hc5h-pmr3-3497 Types: Vendor Advisory
Added Reference Type
VulnCheck: https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-missing-caller-scope-validation-in-device-pair-approval Types: Third Party Advisory

CVE Modified by VulnCheck 3/31/2026 2:16:54 PM

Action Type Old Value New Value
Added CVSS V3.1
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Removed CVSS V3.1
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

New CVE Received from VulnCheck 3/31/2026 11:16:14 AM

Action Type Old Value New Value
Added Description
OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes including admin access by exploiting the missing scope validation in extensions/device-pair/index.ts and src/infra/device-pairing.ts.
Added CVSS V4.0
AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Added CVSS V3.1
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE
CWE-863
Added Reference
https://github.com/openclaw/openclaw/commit/e403decb6e20091b5402780a7ccd2085f98aa3cd
Added Reference
https://github.com/openclaw/openclaw/security/advisories/GHSA-hc5h-pmr3-3497
Added Reference
https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-missing-caller-scope-validation-in-device-pair-approval
联系我们 contact @ memedata.com