CVE-2026-33575

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside the intended one-time pairing flow.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

30 Mar 2026, 15:51

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-7h7g-x2px-94hj - () https://github.com/openclaw/openclaw/security/advisories/GHSA-7h7g-x2px-94hj - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-long-lived-credential-exposure-in-pairing-setup-codes - () https://www.vulncheck.com/advisories/openclaw-long-lived-credential-exposure-in-pairing-setup-codes - Third Party Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw
Openclaw openclaw

Information

Published : 2026-03-29 13:17

Updated : 2026-03-30 15:51


NVD link : CVE-2026-33575

Mitre link : CVE-2026-33575

CVE.ORG link : CVE-2026-33575


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-522

Insufficiently Protected Credentials