PROBABLYPWNED
VulnerabilitiesApril 29, 20263 min read

OpenClaw Pairing Flaw Enables CVSS 9.1 Privilege Escalation

CVE-2026-41386 allows attackers to manipulate bootstrap setup codes during device pairing, bypassing role restrictions and gaining elevated privileges in OpenClaw.

Marcus Chen

A critical privilege escalation vulnerability in OpenClaw allows attackers to gain unauthorized elevated access during the initial device pairing process. CVE-2026-41386, disclosed on April 28, carries a CVSS score of 9.1 and affects all versions prior to 2026.3.22.

The flaw stems from how OpenClaw handles bootstrap setup codes during first-use pairing. These codes aren't properly bound to their intended device roles and scopes, creating an opportunity for attackers to intercept or manipulate the pairing process and claim privileges beyond what they should receive.

TL;DR

  • What happened: Bootstrap setup codes aren't bound to device roles during OpenClaw pairing
  • Who's affected: OpenClaw versions before 2026.3.22
  • Severity: Critical (CVSS 9.1)
  • Action required: Upgrade to OpenClaw version 2026.3.22 or later

How Does the Attack Work?

When a new device pairs with an OpenClaw instance, it exchanges bootstrap setup codes that define its role and operational scope. The vulnerability exists because these codes lack cryptographic binding to their intended configurations.

An attacker positioned to intercept or inject during the pairing handshake can:

  1. Capture legitimate setup codes being exchanged
  2. Modify the role and scope parameters before they're processed
  3. Present the manipulated codes to establish a session with elevated privileges
  4. Gain access to operations that should be restricted to administrators or owner-level accounts

The attack window is narrow—it only exists during initial pairing—but the consequences are severe. Once elevated privileges are established, they persist for the lifetime of that device's session.

Third OpenClaw CVE This Month

This marks the third critical OpenClaw vulnerability disclosed in April 2026. We previously covered CVE-2026-41329, a sandbox escape flaw that also achieved CVSS 9.9. Earlier in the month, CVE-2026-32987 demonstrated how bootstrap replay attacks could lead to admin takeover.

The pattern suggests OpenClaw's authentication and privilege management systems warrant closer scrutiny. AI agent frameworks are increasingly handling sensitive operations, and the security primitives protecting them haven't always kept pace with deployment.

For organizations using OpenClaw in production, the steady stream of critical vulnerabilities should prompt a risk assessment. Are AI agents granted access to systems or data where a privilege escalation would cause significant harm?

What Makes This Different from Previous OpenClaw Flaws

CVE-2026-41329 required an attacker to already have some level of access before escaping the sandbox. CVE-2026-41386 is exploitable during initial setup—before any authentication has occurred. This makes it particularly dangerous in environments where devices might pair with minimal supervision.

IoT deployments, edge computing scenarios, and automated provisioning pipelines are most at risk. Any situation where pairing happens programmatically or without human verification of device identity creates exposure.

Recommended Mitigations

  1. Upgrade immediately — Install OpenClaw version 2026.3.22 or later
  2. Audit recent pairings — Review devices paired in the last 30 days for unexpected privilege levels
  3. Require manual approval — Consider disabling automated pairing until patches are deployed
  4. Network segmentation — Isolate pairing traffic to reduce interception opportunities
  5. Monitor for anomalies — Watch for devices operating outside their expected scope

Frequently Asked Questions

Can this be exploited remotely?

The attacker needs to intercept pairing traffic, which typically requires network proximity or compromise of the network path. Remote exploitation is possible if pairing occurs over untrusted networks.

Are existing paired devices affected?

Devices paired before an attack aren't vulnerable through this specific flaw. However, if an attacker previously exploited this during pairing, those elevated privileges would persist.

The broader AI agent security landscape continues to evolve rapidly. For context on how AI frameworks are expanding attack surfaces, see our earlier analysis.

Related Articles