OpenClaw 权限提升漏洞
OpenClaw privilege escalation vulnerability

原始链接: https://nvd.nist.gov/vuln/detail/CVE-2026-33579

OpenClaw 2026.3.28 之前的版本包含一个与设备配对相关的权限提升漏洞。具体来说,`/pair approve` 命令路径未正确验证用户权限,允许具有配对权限但*没有*管理员访问权限的用户批准设备请求,从而授予更广泛的访问权限,甚至包括管理员级别的访问权限。 此缺陷源于 `extensions/device-pair/index.ts` 和 `src/infra/device-pairing.ts` 文件中缺少范围验证。成功利用可能允许未经授权的用户获得更高的权限。该漏洞被追踪为 CWE-863(不正确的授权)。 OpenClaw 项目已通过提交 (e403decb6e20091b5402780a7ccd2085f98aa3cd) 和安全公告 (GHSA-hc5h-pmr3-3497) 提供了补丁,并在 VulnCheck.com 上进行了详细说明。建议用户升级到 2026.3.28 版本或更高版本以减轻此风险。

## OpenClaw 安全问题 - 摘要 Hacker News 上最近的一篇帖子讨论了 OpenClaw(本地 AI 代理)用户可能遭受广泛黑客攻击的情况。初步报告显示,许多实例可能已被攻破,但评论员们争论其范围,指出需要公开可访问的实例才可能暴露。 核心问题在于 OpenClaw 存在严重的安全漏洞——已记录超过 400 个——以及其潜在的滥用可能性。 担忧集中在使用户不知情地授予管理员权限,尤其是那些缺乏技术专业知识的用户。 虽然 OpenClaw *可以* 安全运行(例如,在 VPS 中或使用正确的端口转发),但许多人可能默认使用了不安全的配置。 讨论强调了向未经审查的软件授予广泛权限的风险,并猜测了创建者的意图,从疏忽到故意恶意设计。 已确定一个 CVE(CVE-2026-33579)是一个真实漏洞。 许多评论员对 AI 生成内容日益增多表示沮丧,甚至在 Hacker News 上也是如此。
相关文章

原文

Description

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes including admin access by exploiting the missing scope validation in extensions/device-pair/index.ts and src/infra/device-pairing.ts.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.

CVSS 4.0 Severity and Vector Strings:
CVSS 3.x Severity and Vector Strings:
CVSS 2.0 Severity and Vector Strings:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-863 Incorrect Authorization VulnCheck  

Change History

3 change records found show changes

Initial Analysis by NIST 4/01/2026 3:07:04 PM

Action Type Old Value New Value
Added CPE Configuration
OR
          *cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* versions up to (excluding) 2026.3.28
Added Reference Type
VulnCheck: https://github.com/openclaw/openclaw/commit/e403decb6e20091b5402780a7ccd2085f98aa3cd Types: Patch
Added Reference Type
VulnCheck: https://github.com/openclaw/openclaw/security/advisories/GHSA-hc5h-pmr3-3497 Types: Vendor Advisory
Added Reference Type
VulnCheck: https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-missing-caller-scope-validation-in-device-pair-approval Types: Third Party Advisory

CVE Modified by VulnCheck 3/31/2026 2:16:54 PM

Action Type Old Value New Value
Added CVSS V3.1
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Removed CVSS V3.1
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

New CVE Received from VulnCheck 3/31/2026 11:16:14 AM

Action Type Old Value New Value
Added Description
OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes including admin access by exploiting the missing scope validation in extensions/device-pair/index.ts and src/infra/device-pairing.ts.
Added CVSS V4.0
AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Added CVSS V3.1
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE
CWE-863
Added Reference
https://github.com/openclaw/openclaw/commit/e403decb6e20091b5402780a7ccd2085f98aa3cd
Added Reference
https://github.com/openclaw/openclaw/security/advisories/GHSA-hc5h-pmr3-3497
Added Reference
https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-missing-caller-scope-validation-in-device-pair-approval
联系我们 contact @ memedata.com