Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-32922 β€” AI Deep Analysis Summary

CVSS 9.9 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: OpenClaw < 2026.3.11 has a critical privilege escalation flaw in `device.token.rotate`.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-266 (Incorrect Privilege Assignment). πŸ” **Flaw**: The `device.token.rotate` endpoint fails to validate scopes properly.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: OpenClaw (Open-source AI Assistant). πŸ“… **Affected Versions**: All versions prior to **2026.3.11**. βœ… **Fixed Version**: 2026.3.11 and later. 🏒 **Vendor**: OpenClaw.

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Privileges**: Escalates from `operator.pairing` to `operator.admin`. πŸ–₯️ **Impact**: Full Remote Code Execution (RCE) on the node.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Auth Required**: Yes, but low barrier. πŸ“‰ **Threshold**: Low. The attacker only needs `operator.pairing` permissions. 🌐 **Network**: Network-accessible (AV:N). πŸšͺ **UI**: No user interaction needed (UI:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: No public PoC or wild exploitation detected yet. πŸ“ **Status**: POCs list is empty in the advisory.…

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Verify your OpenClaw version. πŸ“‹ **Action**: If running < 2026.3.11, you are vulnerable. πŸ›‘οΈ **Scan**: Look for the `device.token.rotate` API endpoint usage.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes! Official patch released in version **2026.3.11**. πŸ“₯ **Action**: Upgrade immediately. πŸ”— **Ref**: See GitHub Security Advisory GHSA-4jpw-hj22-2xmc for details. πŸ› οΈ

Q9What if no patch? (Workaround)

🚧 **Workaround**: If you cannot patch immediately, restrict `operator.pairing` permissions strictly. 🚫 **Mitigation**: Disable `device.token.rotate` if possible.…

Q10Is it urgent? (Priority Suggestion)

πŸ”΄ **Priority**: CRITICAL (CVSS 9.8). πŸš€ **Urgency**: Patch ASAP. ⚑ **Reason**: RCE is possible with minimal initial access. πŸ“’ **Recommendation**: Treat as immediate action item for all OpenClaw deployments.