EUVD-2026-13933

| CVE-2026-32042 HIGH
2026-03-21 VulnCheck GHSA-r3gm-fv85-xjqj
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
PoC Detected
Mar 23, 2026 - 17:10 vuln.today
Public exploit code
Analysis Generated
Mar 21, 2026 - 01:00 vuln.today
EUVD ID Assigned
Mar 21, 2026 - 01:00 euvd
EUVD-2026-13933
Patch Released
Mar 21, 2026 - 01:00 nvd
Patch available
CVE Published
Mar 21, 2026 - 00:42 nvd
HIGH 8.8

Description

OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a privilege escalation vulnerability allowing unpaired device identities to bypass operator pairing requirements and self-assign elevated operator scopes including operator.admin. Attackers with valid shared gateway authentication can present a self-signed unpaired device identity to request and obtain higher operator scopes before pairing approval is granted.

Analysis

OpenClaw versions 2026.2.22 through 2026.2.24 contain a privilege escalation vulnerability that allows authenticated attackers to bypass device pairing requirements and self-assign elevated operator.admin scopes. Attackers with valid shared gateway authentication credentials can present self-signed unpaired device identities to obtain administrator privileges before pairing approval is granted. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all systems running OpenClaw 2026.2.22-2026.2.24 and assess exposure scope; notify relevant teams and restrict administrative access where possible. Within 7 days: Apply vendor patch to all affected OpenClaw instances and validate successful deployment through system testing. …

Sign in for detailed remediation steps.

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: +20

Share

EUVD-2026-13933 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy