OpenClaw Improper Authorization Vulnerability (CVE-2026-42426)
OpenClaw before 2026.4.8 contains an improper authorization vulnerability (CVE-2026-42426) allowing attackers with `operator.write` permissions to bypass node pairing approval and gain unauthorized access to `exec`-capable nodes by exploiting the `node.pair.approve` method which incorrectly accepts the `operator.write` scope instead of the narrower `operator.pairing` scope.
OpenClaw versions prior to 2026.4.8 are vulnerable to an improper authorization flaw (CVE-2026-42426). The vulnerability resides within the node.pair.approve method, which erroneously accepts the operator.write scope instead of the intended operator.pairing scope. This oversight enables users possessing operator.write permissions, which are typically less privileged, to circumvent the intended node pairing approval process. Successful exploitation allows unauthorized access to nodes capable of executing commands (exec-capable nodes). This vulnerability was publicly disclosed in April 2026 and presents a significant risk to OpenClaw deployments, potentially leading to unauthorized command execution and data compromise.
Attack Chain
- Attacker gains
operator.writepermissions, potentially through compromised credentials or other means. - Attacker identifies an
exec-capable node that requires pairing. - Attacker crafts a request to the
node.pair.approvemethod, using theiroperator.writecredentials. - The
node.pair.approvemethod incorrectly validates theoperator.writescope, instead of requiringoperator.pairing. - The node pairing request is approved despite the attacker lacking the proper
operator.pairingpermission. - The attacker establishes a connection to the now-paired
exec-capable node. - Attacker executes arbitrary commands on the compromised node due to the unauthorized pairing.
Impact
Successful exploitation of CVE-2026-42426 allows attackers with operator.write permissions to bypass node pairing restrictions and gain unauthorized access to exec-capable nodes. This can lead to arbitrary command execution on the affected nodes, potentially leading to data breaches, system compromise, or denial-of-service conditions. The severity of the impact depends on the capabilities and data accessible to the compromised node.
Recommendation
- Upgrade OpenClaw to version 2026.4.8 or later to patch CVE-2026-42426.
- Monitor OpenClaw logs for attempts to call the
node.pair.approvemethod using accounts with onlyoperator.writepermissions. Deploy the Sigma rule to detect this activity. - Review and enforce strict access control policies to minimize the risk of unauthorized users obtaining
operator.writepermissions.
Detection coverage 2
Detect OpenClaw node.pair.approve Attempt with Operator.write Scope
highDetects attempts to call the node.pair.approve method in OpenClaw using accounts that only have operator.write permissions, indicating a potential CVE-2026-42426 exploitation attempt.
Detect OpenClaw node.pair.approve Method Call
mediumDetects calls to the OpenClaw node.pair.approve method, which can be used to identify potential unauthorized pairing attempts. This rule does not specifically detect exploitation but provides broad visibility of the affected API.
Detection queries are kept inside the platform. Get full rules →