Cyber Posture

CVE-2026-32922

CriticalPublic PoC

Published: 29 March 2026

Published
29 March 2026
Modified
31 March 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0028 51.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrain newly minted scopes to the caller's current scope set. Attackers can obtain operator.admin tokens…

more

for paired devices and achieve remote code execution on connected nodes via system.run or gain unauthorized gateway-admin access.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces the principle of least privilege by requiring that token minting in device.token.rotate is restricted to the caller's existing scope set, directly preventing privilege escalation to operator.admin.

prevent

Mandates enforcement of approved authorizations in access control mechanisms, ensuring device.token.rotate constrains newly minted token scopes to those authorized for the caller.

prevent

Requires validation of inputs to device.token.rotate to reject requests for scopes broader than the caller's current set, mitigating the failure to constrain minted token privileges.

Security SummaryAI

CVE-2026-32922 is a privilege escalation vulnerability (CWE-266) in OpenClaw versions before 2026.3.11. The flaw exists in the device.token.rotate function, which permits callers possessing the operator.pairing scope to mint new tokens with broader scopes. This occurs due to a failure to constrain the scopes of newly minted tokens to the caller's existing scope set.

Attackers require low privileges (PR:L), specifically the operator.pairing scope, along with network access (AV:N) to exploit the vulnerability remotely without user interaction (UI:N). Exploitation allows obtaining operator.admin tokens for paired devices, enabling remote code execution on connected nodes via the system.run function or unauthorized gateway-admin access. The issue has a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), reflecting its critical impact across confidentiality, integrity, and availability in a scope-changed context.

Advisories from the OpenClaw GitHub security page (GHSA-4jpw-hj22-2xmc) and VulnCheck detail the vulnerability and recommend upgrading to OpenClaw 2026.3.11 or later to mitigate the issue, as earlier versions remain affected.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.3.11

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Privilege escalation vulnerability allowing low-privileged remote callers to mint admin tokens, directly mapping to Exploitation for Privilege Escalation (T1068) and Exploitation of Remote Services (T1210).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References