CVE-2026-42426: OpenClaw `node.pair.approve` placed in `operator.write` scope instead of `operator.pairing` allows unprivileged pairing approval
(updated )
OpenClaw node.pair.approve placed in operator.write scope instead of operator.pairing allows unprivileged pairing approval.
The pairing approval method accepted operator.write instead of the narrower pairing scope and admin requirement for exec-capable nodes.
OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary.
References
- github.com/advisories/GHSA-67mf-f936-ppxf
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5
- github.com/openclaw/openclaw/security/advisories/GHSA-67mf-f936-ppxf
- nvd.nist.gov/vuln/detail/CVE-2026-42426
- www.vulncheck.com/advisories/openclaw-improper-authorization-in-node-pair-approve-via-operator-write-scope
Code Behaviors & Features
Detect and mitigate CVE-2026-42426 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →