Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. openclaw
  4. ›
  5. GHSA-4jpw-hj22-2xmc

GHSA-4jpw-hj22-2xmc: OpenClaw: Pairing-scoped device tokens could mint `operator.admin` and reach node RCE

March 13, 2026

In affected versions of openclaw, a caller holding only operator.pairing could use device.token.rotate to mint a new token with broader scopes for an already paired device. If the target device was approved for operator.admin, the attacker could obtain an administrative token without already holding administrative scope.

References

  • github.com/advisories/GHSA-4jpw-hj22-2xmc
  • github.com/openclaw/openclaw
  • github.com/openclaw/openclaw/releases/tag/v2026.3.11
  • github.com/openclaw/openclaw/security/advisories/GHSA-4jpw-hj22-2xmc

Code Behaviors & Features

Detect and mitigate GHSA-4jpw-hj22-2xmc with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2026.3.11

Fixed versions

  • 2026.3.11

Solution

Upgrade to version 2026.3.11 or above.

Impact 9.9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-269: Improper Privilege Management

Source file

npm/openclaw/GHSA-4jpw-hj22-2xmc.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:19:08 +0000.