Authorization Bypass in OpenClaw Affects Multi-Account Deployments
CVE-2026-32067
2LOW
What is CVE-2026-32067?
OpenClaw prior to version 2026.2.26 is susceptible to an authorization bypass vulnerability in the pairing-store access controls governing direct message pairing policies. This flaw enables attackers who have gained approval to send messages from one account to exploit it across multiple accounts without requiring additional approvals. Consequently, an attacker leveraging this weakness could easily bypass established authorization boundaries, undermining the security of multi-account deployments.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
OpenClaw 0 < 2026.2.26
OpenClaw 2026.2.26
References
CVSS V4
Score:
2
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved
Credit
tdjackey
