CVE-2026-33575 PUBLISHED

OpenClaw < 2026.3.12 - Long-lived Credential Exposure in Pairing Setup Codes

Assigner: VulnCheck
Reserved: 23.03.2026 Published: 29.03.2026 Updated: 29.03.2026

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside the intended one-time pairing flow.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.6

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.3.12 (excl.)
  • Version 2026.3.12 is unaffected

Credits

  • lintsinghua reporter
  • Knoxar (@woreksami) reporter

References

Problem Types

  • Insufficiently Protected Credentials CWE