OpenClaw Bootstrap Replay Bug Enables Admin Takeover (CVE-2026-32987)
Critical CVSS 9.8 flaw in OpenClaw AI agent platform lets attackers replay setup codes for privilege escalation. Patch to version 2026.3.13 immediately.
A critical vulnerability in OpenClaw's device pairing system allows attackers to replay bootstrap setup codes, escalating privileges to operator.admin level. CVE-2026-32987 carries a CVSS score of 9.8 and was publicly disclosed on March 29, 2026.
OpenClaw is an open-source framework for building and deploying AI agents. Organizations using it for automation workflows should patch immediately—the flaw requires no authentication and can be exploited remotely.
What's Vulnerable
The bug exists in src/infra/device-bootstrap.ts, where the system fails to properly invalidate bootstrap setup codes after their initial use during device pairing verification. An attacker with access to a valid bootstrap code can submit it repeatedly before the system finalizes the pairing, with each successful replay cumulatively elevating privileges.
The attack is straightforward: capture a valid bootstrap code (through network sniffing, log access, or social engineering), then hammer the verification endpoint with that code during the critical pairing window. The code should be single-use, but the implementation doesn't enforce it.
This vulnerability pattern—where single-use tokens aren't actually invalidated—has appeared elsewhere. We saw similar authentication weaknesses in LangChain/LangGraph just days ago, suggesting that AI framework developers may be underestimating the security rigor required for production deployments.
Impact
Successful exploitation grants attacker-controlled devices operator.admin privileges within the OpenClaw deployment. From there, an attacker can:
- Read and modify agent configurations
- Access connected data sources and APIs
- Deploy malicious agent behaviors
- Exfiltrate data processed by AI workflows
Given OpenClaw's role in connecting AI agents to enterprise systems, compromise here could cascade into broader infrastructure access. Organizations have increasingly woven AI agents into critical workflows, making frameworks like OpenClaw attractive targets.
Who's Affected
All OpenClaw versions before 2026.3.13 are vulnerable. The vulnerability specifically impacts deployments where:
- Device pairing is enabled
- Bootstrap codes are distributed to users or systems
- The pairing verification window is accessible over the network
Default configurations that rely on bootstrap pairing are at risk. Organizations running OpenClaw in air-gapped environments or with pairing disabled may have reduced exposure, but should still patch.
Remediation
Upgrade OpenClaw to version 2026.3.13 or later. The fix adds proper code invalidation after first use and implements rate limiting on the verification endpoint.
If immediate patching isn't possible:
- Disable device pairing temporarily until you can update
- Audit recent pairings for any suspicious patterns (multiple successful verifications with the same code)
- Rotate any bootstrap codes that may have been exposed
- Review operator.admin accounts for unauthorized additions
The Bigger Picture
This disclosure follows a rough stretch for AI framework security. Between the Langflow RCE that saw exploitation within 20 hours of disclosure and ongoing supply chain attacks targeting AI tooling, the AI development ecosystem is demonstrating that rapid innovation often outpaces security maturity.
Organizations deploying AI agents should treat these frameworks with the same security scrutiny they'd apply to any internet-facing application—because increasingly, that's exactly what they are.
Related Articles
Caddy Server Flaw Lets Users Impersonate Admins
CVE-2026-30851 in Caddy's forward_auth module enables identity injection and privilege escalation. Any valid user can impersonate administrators. Update to 2.11.2.
Mar 8, 2026TP-Link Archer Routers Vulnerable to Unauthenticated Takeover
Critical CVE-2025-15517 allows attackers to bypass authentication on TP-Link Archer NX routers, upload malicious firmware, and modify configurations without credentials.
Mar 26, 2026Quest KACE SMA CVSS 10.0 Flaw Exploited in the Wild
Attackers exploiting CVE-2025-32975 authentication bypass in Quest KACE to hijack admin accounts and deploy credential harvesters. Patched in May 2025—many remain exposed.
Mar 24, 2026Ubuntu Desktop Flaw Lets Local Users Escalate to Root
CVE-2026-3888 exploits timing race between snap-confine and systemd-tmpfiles to grant root access on Ubuntu Desktop 24.04+. Qualys researchers demonstrate full privilege escalation.
Mar 23, 2026