clawsmith.com/signal/cve-2026-35639-device-pair-approve-priv-esc
⚠ IssueWide OpenLive
CVE-2026-35639: OpenClaw device.pair.approve privilege escalation (CVSS 8.7) — highest severity in April 2026 batch
The device.pair.approve handler fails to validate that the requesting token holds the device.pair scope before approving pairing. Any valid limited token can submit a pairing approval and receive operator-level session. Remotely exploitable on unauthenticated instances with no credentials required. Fixed in v2026.4.5.
Product Idea from this Signal
A CLI tool that audits OpenClaw device token scopes and blocks privilege escalation paths before attackers exploit them
1.4k ▲SECURITYCLIDEVTOOLOPEN-SOURCE
CompetitiveView Opportunity →
Product Idea from this Signal
A security service that auto-patches OpenClaw CVEs within hours of disclosure before attackers exploit them
5.7k ▲SECURITYCLIDEVTOOLOPEN-SOURCESYSADMIN
CompetitiveView Opportunity →
Score Breakdown
Issues
100
Social Proof 2 sources
Frequently Asked Questions
Virality Score
100
across 0 platforms
Details
Signalissue
Ecosystem—
Sources2
Platforms0
Updated2d ago
Trend→ stable
Top ideas
All ideas →Related signals
All signals →