A client using shared gateway auth could attach an unpaired device identity and request elevated operator scopes (including operator.admin) before pairing approval, enabling privilege escalation.
Attackers with valid shared gateway auth could self-assign higher operator scopes by presenting a self-signed, unpaired device identity.
openclaw (npm)>= 2026.2.22 <= 2026.2.242026.2.242026.2.25Require pairing for operator device-identity sessions authenticated with shared token/password auth (except existing control-ui trusted-proxy/control-ui bypass policy paths).
8d1481cb4a9d31bd617e52dc8c392c35689d9deapatched_versions is pre-set to the release (>= 2026.2.25). Advisory published with npm release 2026.2.25.
OpenClaw thanks @tdjackey for reporting.
{
"nvd_published_at": null,
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2026-03-03T21:39:10Z",
"cwe_ids": [
"CWE-863"
]
}