Connect Clawsmith to your coding agent. Ship products like crazy.Unlimited usage during betaGet API Key →
← Back to dashboard
clawsmith.com/signal/cve-2026-32922-cvss-99-privilege-escalation-openclaw
IssueWide OpenLive

CVE-2026-32922: CVSS 9.9 Privilege Escalation Lets Any Paired Device Become Full Admin

OpenClaw's device.token.rotate function fails to constrain new token scopes to the caller's existing scope set. Any device with operator.pairing scope can request and receive operator.admin in one API call. CVSS 9.9. Fixed in v2026.3.11. 137 total security advisories tracked between February and April 2026.

Product Idea from this Signal

A CLI tool that audits OpenClaw device token scopes and blocks privilege escalation paths before attackers exploit them

920

CVE-2026-32922 (CVSS 9.9) proved that a single API call to device.token.rotate can escalate any paired device to full admin. The root cause was missing scope validation, but the broader problem is that OpenClaw operators have zero visibility into which devices hold what scopes, which tokens have been rotated suspiciously, and whether their instance is still vulnerable. 137 security advisories were filed in 60 days. This CLI tool continuously audits device tokens, flags over-scoped devices, detects rotation anomalies, and blocks escalation attempts at the gateway level.

SECURITYCLIDEVTOOLOPEN-SOURCE
CompetitiveView Opportunity →

Score Breakdown

HN
770
GitHub
150

Frequently Asked Questions