Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-33579 β€” AI Deep Analysis Summary

CVSS 9.9 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: OpenClaw has a critical **Privilege Escalation** flaw in the `/pair approve` command.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-863** (Incorrect Authorization). The system fails to validate the **caller's scope** when processing device pair approvals.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **OpenClaw** products. Specifically, all versions **prior to 2026.3.28**. If you are running an older build, your smart assistant infrastructure is vulnerable to this scope validation bypass.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: A hacker with **Pairing Permissions** (but no Admin rights) can escalate privileges. They can approve device requests that grant **Full Admin Access**.…

Q5Is exploitation threshold high? (Auth/Config)

βš–οΈ **Exploitation Threshold**: **Low**. 🎯 **Auth Required**: Yes, but only **Low Privileges** (PR:L). The attacker needs to be authenticated with pairing rights. No User Interaction (UI:N) is needed.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exploit**: **No**. The `pocs` array is empty. While there are **Advisories** (VulnCheck, GitHub GHSA), there is no known public Proof-of-Concept (PoC) code or wild exploitation scripts available yet.…

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: 1. Check your OpenClaw version. Is it **< 2026.3.28**? 2. Audit users with **Pairing Permissions**. Do any lack Admin rights? 3. Review logs for `/pair approve` commands initiated by non-admin users.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **Yes**. The vendor has released a patch. The fix is committed in GitHub commit `e403decb6e20091b5402780a7ccd2085f98aa3cd`.…

Q9What if no patch? (Workaround)

🚧 **Workaround (If No Patch)**: 1. **Restrict Permissions**: Remove pairing approval rights from all non-admin users immediately. 2. **Monitor Closely**: Alert on any `/pair approve` actions. 3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. 🚨 With a CVSS score indicating High impact and Low complexity, this is a critical risk.…