CVE-2026-42422: OpenClaw `device.token.rotate` mints tokens for unapproved roles, bypassing device role-upgrade pairing
(updated )
OpenClaw device.token.rotate mints tokens for unapproved roles, bypassing device role-upgrade pairing.
Device token rotation could mint or preserve roles/scopes that had not gone through the intended pairing approval.
OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary.
References
- github.com/advisories/GHSA-whf9-3hcx-gq54
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5
- github.com/openclaw/openclaw/security/advisories/GHSA-whf9-3hcx-gq54
- nvd.nist.gov/vuln/detail/CVE-2026-42422
- www.vulncheck.com/advisories/openclaw-role-bypass-in-device-token-rotate-function
Code Behaviors & Features
Detect and mitigate CVE-2026-42422 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →