CVSS Score: 5.3 Published: 2026-03-13 Full Report: https://cvereports.com/reports/GHSA-7H7G-X2PX-94HJ
The OpenClaw personal AI assistant ecosystem suffers from an insufficiently protected credentials vulnerability (CWE-522) during the device pairing process. The Gateway generates setup codes that embed permanent, shared authentication tokens rather than ephemeral bootstrap keys. Interception of these codes grants an attacker persistent access to the user's Gateway, exposing integrated AI service API keys, chat histories, and agent configurations. The vulnerability is resolved in version v2026.3.12 through the implementation of short-lived, per-device session credentials.
OpenClaw versions prior to v2026.3.12 expose long-lived gateway credentials in device pairing QR codes and setup strings, enabling persistent unauthorized access if intercepted.
- Vulnerability Type: Insufficiently Protected Credentials (CWE-522)
- Attack Vector: Physical / Adjacent / Network (via intercepted setup payload)
- Impact: Persistent Unauthorized Gateway Access
- Exploit Status: Proof of Concept (PoC)
- CVSS Score: 5.3 (Moderate)
- CISA KEV: Not Listed
- OpenClaw Gateway
- OpenClaw CLI
- openclaw npm package
- openclaw: < v2026.3.12 (Fixed in:
v2026.3.12)
- Upgrade the openclaw package to the patched version (v2026.3.12 or later).
- Rotate and regenerate all Gateway authentication tokens after upgrading.
- Audit paired devices regularly using the OpenClaw CLI.
- Ensure pairing QR codes are generated and scanned only in secure, private environments.
Remediation Steps:
- Open a terminal and run
npm install -g openclaw@latestto install version v2026.3.12 or newer. - Restart the OpenClaw Gateway service to apply the new binary.
- Run the token regeneration command specific to your Gateway deployment to invalidate old long-lived tokens.
- Run
openclaw pairing listto review all connected devices. - Remove any unrecognized devices from the authorized pairings list.
- GitHub Advisory GHSA-7H7G-X2PX-94HJ
- OpenClaw Security Policy
- Release Notes (v2026.3.12)
- Aliyun Vulnerability Database AVD-2026-1859837
Generated by CVEReports - Automated Vulnerability Intelligence