| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-67mf-f936-ppxf | OpenClaw `node.pair.approve` placed in `operator.write` scope instead of `operator.pairing` allows unprivileged pairing approval |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 29 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.8 contains an improper authorization vulnerability where the node.pair.approve method accepts operator.write scope instead of the narrower operator.pairing scope, allowing unprivileged users to approve node pairing. Attackers with operator.write permissions can bypass pairing approval restrictions to gain unauthorized access to exec-capable nodes. | |
| Title | OpenClaw < 2026.4.8 - Improper Authorization in node.pair.approve via operator.write Scope | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-863 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-29T18:26:40.673Z
Reserved: 2026-04-27T11:38:59.195Z
Link: CVE-2026-42426
Updated: 2026-04-29T18:26:22.310Z
Status : Analyzed
Published: 2026-04-28T19:37:46.360
Modified: 2026-04-30T14:05:07.443
Link: CVE-2026-42426
No data.
OpenCVE Enrichment
Updated: 2026-04-28T23:00:13Z
Github GHSA