Replay Vulnerability in OpenClaw Product by OpenClaw
CVE-2026-32987

9.3CRITICAL

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
29 March 2026

What is CVE-2026-32987?

OpenClaw prior to version 2026.3.13 is susceptible to a replay vulnerability that enables attackers to exploit bootstrap setup codes during the device pairing process. This vulnerability allows attackers to repeatedly utilize a valid bootstrap code before it is approved, potentially escalating permissions and gaining operator.admin level access. The flaw resides in the device pairing verification process (src/infra/device-bootstrap.ts), making it critical for users to upgrade to the latest version to mitigate associated risks.

Affected Version(s)

OpenClaw 0 < 2026.3.13

OpenClaw 2026.3.13

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

tdjackey
.