CWE-648

Incorrect Use of Privileged APIs

12 CVEs Avg CVSS 7.6 MITRE
0
CRITICAL
7
HIGH
5
MEDIUM
0
LOW
0
POC
0
KEV

Monthly

CVE-2026-35669 HIGH PATCH GHSA This Week

Privilege escalation in OpenClaw gateway-authenticated plugin HTTP routes allows authenticated attackers to bypass scope restrictions and gain operator.admin privileges. The vulnerability affects OpenClaw versions prior to 2026.3.25, enabling low-privileged authenticated users to perform unauthorized administrative actions through improperly minted runtime scopes. Exploitation requires network access and low-level authentication but no user interaction. No public exploit identified at time of analysis.

Privilege Escalation
NVD GitHub
CVSS 4.0
8.7
EPSS
0.0%
CVE-2026-35663 HIGH PATCH GHSA This Week

Privilege escalation in OpenClaw versions prior to 2026.3.25 allows authenticated low-privilege operators to bypass pairing requirements during backend reconnection, self-requesting elevated scopes to gain operator.admin privileges. Attackers with existing operator credentials exploit improper scope validation (CWE-648) to escalate from limited operator access to full administrative control over the OpenClaw system. Exploitation requires network access and low-privilege authentication (CVSS:3.1 PR:L), enabling high-impact compromise of confidentiality, integrity, and availability. No public exploit identified at time of analysis.

Privilege Escalation
NVD GitHub
CVSS 4.0
8.7
EPSS
0.0%
CVE-2026-35645 MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 contains a privilege escalation vulnerability in the gateway plugin subagent fallback deleteSession function that improperly uses a synthetic operator.admin runtime scope, allowing authenticated attackers to execute privileged operations with unintended administrative access by triggering session deletion without a request-scoped client. CVSS score of 6.1 reflects the requirement for low-level user authentication (PR:L) and network accessibility; patch availability is confirmed.

Privilege Escalation Openclaw
NVD GitHub
CVSS 4.0
6.1
EPSS
0.0%
CVE-2026-35639 HIGH PATCH GHSA This Week

Privilege escalation in OpenClaw before 2026.3.22 enables authenticated attackers with operator.pairing approver role to escalate privileges to operator.admin through insufficient scope validation in the device.pair.approve method. Exploitation allows approval of device requests with broader operator scopes than the approver legitimately holds, ultimately enabling remote code execution on Node infrastructure. Affects OpenClaw deployments where role-based access control enforces operator privilege hierarchies. No public exploit identified at time of analysis.

RCE Privilege Escalation Openclaw
NVD GitHub
CVSS 4.0
8.7
EPSS
0.2%
CVE-2026-35625 HIGH PATCH This Week

Privilege escalation in OpenClaw (versions prior to 2026.3.25) enables authenticated local attackers to silently elevate permissions from operator.read to operator.admin during shared-auth reconnection events, achieving remote code execution on affected nodes. The vulnerability exploits auto-approval of scope-upgrade requests in local reconnection flows, requiring low-privilege local access (PR:L) with no user interaction. No public exploit identified at time of analysis. Vendor-released patch available via commit 81ebc7e0344fd19c85778e883bad45e2da972229.

RCE Privilege Escalation Openclaw
NVD GitHub
CVSS 4.0
8.5
EPSS
0.0%
CVE-2026-20126 HIGH This Week

Catalyst Sd-Wan Manager contains a vulnerability that allows attackers to an authenticated, local attacker with low privileges to gain root privileges on (CVSS 8.8).

Cisco Catalyst Sd Wan Manager
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-20122 MEDIUM This Month

Catalyst Sd-Wan Manager contains a vulnerability that allows attackers to overwrite arbitrary files on the affected system and gain vmanage user priv (CVSS 5.4).

Cisco Catalyst Sd Wan Manager
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-22922 MEDIUM PATCH This Month

Airflow versions up to 3.1.6 contains a vulnerability that allows attackers to an authenticated user with custom permissions limited to task access to view tas (CVSS 6.5).

Apache Airflow
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2024-32008 HIGH This Month

A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). Rated high severity (CVSS 8.5), this vulnerability is low attack complexity. No vendor patch available.

RCE Privilege Escalation
NVD
CVSS 4.0
8.5
EPSS
0.0%
CVE-2025-23375 HIGH This Week

Dell PowerProtect Data Manager Reporting, version(s) 19.17, contain(s) an Incorrect Use of Privileged APIs vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.

Dell Information Disclosure Powerprotect Data Manager
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-35669
EPSS 0% CVSS 8.7
HIGH PATCH This Week

Privilege escalation in OpenClaw gateway-authenticated plugin HTTP routes allows authenticated attackers to bypass scope restrictions and gain operator.admin privileges. The vulnerability affects OpenClaw versions prior to 2026.3.25, enabling low-privileged authenticated users to perform unauthorized administrative actions through improperly minted runtime scopes. Exploitation requires network access and low-level authentication but no user interaction. No public exploit identified at time of analysis.

Privilege Escalation
NVD GitHub
CVE-2026-35663
EPSS 0% CVSS 8.7
HIGH PATCH This Week

Privilege escalation in OpenClaw versions prior to 2026.3.25 allows authenticated low-privilege operators to bypass pairing requirements during backend reconnection, self-requesting elevated scopes to gain operator.admin privileges. Attackers with existing operator credentials exploit improper scope validation (CWE-648) to escalate from limited operator access to full administrative control over the OpenClaw system. Exploitation requires network access and low-privilege authentication (CVSS:3.1 PR:L), enabling high-impact compromise of confidentiality, integrity, and availability. No public exploit identified at time of analysis.

Privilege Escalation
NVD GitHub
CVE-2026-35645
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

OpenClaw before version 2026.3.25 contains a privilege escalation vulnerability in the gateway plugin subagent fallback deleteSession function that improperly uses a synthetic operator.admin runtime scope, allowing authenticated attackers to execute privileged operations with unintended administrative access by triggering session deletion without a request-scoped client. CVSS score of 6.1 reflects the requirement for low-level user authentication (PR:L) and network accessibility; patch availability is confirmed.

Privilege Escalation Openclaw
NVD GitHub
CVE-2026-35639
EPSS 0% CVSS 8.7
HIGH PATCH This Week

Privilege escalation in OpenClaw before 2026.3.22 enables authenticated attackers with operator.pairing approver role to escalate privileges to operator.admin through insufficient scope validation in the device.pair.approve method. Exploitation allows approval of device requests with broader operator scopes than the approver legitimately holds, ultimately enabling remote code execution on Node infrastructure. Affects OpenClaw deployments where role-based access control enforces operator privilege hierarchies. No public exploit identified at time of analysis.

RCE Privilege Escalation Openclaw
NVD GitHub
CVE-2026-35625
EPSS 0% CVSS 8.5
HIGH PATCH This Week

Privilege escalation in OpenClaw (versions prior to 2026.3.25) enables authenticated local attackers to silently elevate permissions from operator.read to operator.admin during shared-auth reconnection events, achieving remote code execution on affected nodes. The vulnerability exploits auto-approval of scope-upgrade requests in local reconnection flows, requiring low-privilege local access (PR:L) with no user interaction. No public exploit identified at time of analysis. Vendor-released patch available via commit 81ebc7e0344fd19c85778e883bad45e2da972229.

RCE Privilege Escalation Openclaw
NVD GitHub
CVE-2026-20126
EPSS 0% CVSS 8.8
HIGH This Week

Catalyst Sd-Wan Manager contains a vulnerability that allows attackers to an authenticated, local attacker with low privileges to gain root privileges on (CVSS 8.8).

Cisco Catalyst Sd Wan Manager
NVD
CVE-2026-20122
EPSS 0% CVSS 5.4
MEDIUM This Month

Catalyst Sd-Wan Manager contains a vulnerability that allows attackers to overwrite arbitrary files on the affected system&nbsp;and gain vmanage user priv (CVSS 5.4).

Cisco Catalyst Sd Wan Manager
NVD
CVE-2026-22922
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Airflow versions up to 3.1.6 contains a vulnerability that allows attackers to an authenticated user with custom permissions limited to task access to view tas (CVSS 6.5).

Apache Airflow
NVD GitHub
CVE-2024-32008
EPSS 0% CVSS 8.5
HIGH This Month

A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). Rated high severity (CVSS 8.5), this vulnerability is low attack complexity. No vendor patch available.

RCE Privilege Escalation
NVD
CVE-2025-23375
EPSS 0% CVSS 7.8
HIGH This Week

Dell PowerProtect Data Manager Reporting, version(s) 19.17, contain(s) an Incorrect Use of Privileged APIs vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.

Dell Information Disclosure Powerprotect Data Manager
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy