OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside the intended one-time pairing flow.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/security/advisories/GHSA-7h7g-x2px-94hj | Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-long-lived-credential-exposure-in-pairing-setup-codes | Third Party Advisory |
Configurations
History
30 Mar 2026, 15:51
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-7h7g-x2px-94hj - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-long-lived-credential-exposure-in-pairing-setup-codes - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw
Openclaw openclaw |
Information
Published : 2026-03-29 13:17
Updated : 2026-03-30 15:51
NVD link : CVE-2026-33575
Mitre link : CVE-2026-33575
CVE.ORG link : CVE-2026-33575
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-522
Insufficiently Protected Credentials
