Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. openclaw
  4. ›
  5. GHSA-7h7g-x2px-94hj

GHSA-7h7g-x2px-94hj: OpenClaw: Pairing setup codes exposed long-lived shared gateway credentials instead of short-lived bootstrap tokens

March 13, 2026

OpenClaw pairing setup codes generated by /pair and openclaw qr embedded the configured shared gateway token or password directly in the setup payload. Anyone who obtained that code from chat history, logs, screenshots, or copied QR payloads could recover the long-lived shared credential.

References

  • github.com/advisories/GHSA-7h7g-x2px-94hj
  • github.com/openclaw/openclaw
  • github.com/openclaw/openclaw/releases/tag/v2026.3.12
  • github.com/openclaw/openclaw/security/advisories/GHSA-7h7g-x2px-94hj

Code Behaviors & Features

Detect and mitigate GHSA-7h7g-x2px-94hj with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2026.3.12

Fixed versions

  • 2026.3.12

Solution

Upgrade to version 2026.3.12 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-532: Insertion of Sensitive Information into Log File

Source file

npm/openclaw/GHSA-7h7g-x2px-94hj.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:03 +0000.