OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside the intended one-time pairing flow.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 29 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside the intended one-time pairing flow. | |
| Title | OpenClaw < 2026.3.12 - Long-lived Credential Exposure in Pairing Setup Codes | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-522 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-29T12:44:32.407Z
Reserved: 2026-03-23T11:00:48.408Z
Link: CVE-2026-33575
No data.
Status : Received
Published: 2026-03-29T13:17:03.370
Modified: 2026-03-29T13:17:03.370
Link: CVE-2026-33575
No data.
OpenCVE Enrichment
No data.
Weaknesses