Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

452+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-32922: OpenClaw Privilege Escalation via Token Scope Bypass
CVE-2026-32922: OpenClaw Privilege Escalation via Token Scope Bypass

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-32922

CVE-2026-32922: OpenClaw Privilege Escalation via Token Scope Bypass

A critical CVSS 9.9 privilege escalation vulnerability in OpenClaw allows operators with limited pairing scope to mint tokens with unrestricted admin privileges, enabling full platform takeover without authorization.

Dylan H.

Security Team

March 29, 2026
5 min read

Affected Products

  • OpenClaw before 2026.3.11

CVE-2026-32922: Critical Privilege Escalation in OpenClaw Token Rotation

A critical privilege escalation vulnerability identified as CVE-2026-32922 has been disclosed in OpenClaw versions prior to 2026.3.11. The flaw exists in the device.token.rotate endpoint, which fails to constrain the scopes of newly minted tokens to the caller's existing scope set. An attacker holding an operator.pairing token — a low-privilege credential used for device onboarding — can exploit this vulnerability to issue themselves a token with operator.admin scope, achieving complete platform administrative access.

The vulnerability carries a CVSS v3.1 score of 9.9 (Critical) and is classified under CWE-269 — Improper Privilege Management, reflecting a systemic failure to enforce scope inheritance during token rotation operations.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-32922
CVSS Score9.9 (Critical)
CWE ClassificationCWE-269 — Improper Privilege Management
Affected SoftwareOpenClaw before 2026.3.11
Vulnerable Endpointdevice.token.rotate
Vulnerable Scopeoperator.pairing
Achievable Escalationoperator.admin
Attack VectorNetwork (Remote)
Authentication RequiredYes — operator.pairing token
Exploit ComplexityLow
Patch AvailableYes — upgrade to OpenClaw 2026.3.11 or later

Technical Details

Affected Component

The vulnerability resides in the token rotation mechanism of OpenClaw's device management API. The device.token.rotate endpoint is intended to allow devices to refresh their access tokens while preserving the same privilege level. However, the endpoint does not validate that the newly requested scopes are a subset of the caller's current scope set.

Exploitation Mechanism

When an authenticated operator with an operator.pairing token calls device.token.rotate and specifies broader scopes in the rotation request, the server issues the requested token without validating scope constraints:

POST /api/device/token/rotate HTTP/1.1
Authorization: Bearer <operator.pairing_token>
Content-Type: application/json

{
  "requested_scopes": ["operator.admin", "operator.pairing", "device.manage"]
}

Because the server omits scope-limiting validation against the caller's current privilege set, it returns a token granting the requested operator.admin scope. The attacker now holds a credential with full administrative access to the OpenClaw deployment.


Attack Flow

1. Attacker obtains a low-privilege operator.pairing token
   (e.g., via device provisioning, credential theft, or insider access)

2. Attacker calls device.token.rotate with operator.admin in the requested_scopes list

3. OpenClaw server fails to check that requested_scopes ⊆ current_token_scopes

4. Server issues a new token containing operator.admin scope

5. Attacker uses the elevated token to access admin-only API endpoints

6. Full platform compromise: device management, configuration, user data, and admin functions

Scope Inheritance Failure Context

Modern token-based authorization systems — OAuth 2.0, JWT, and custom implementations — rely on the principle that a token can never grant more privilege than the token used to create it. This is the fundamental security property of scope inheritance:

  • A token with scope read:profile should never be usable to obtain a token with scope admin:all
  • Rotation endpoints are especially dangerous because they involve the server actively issuing new credentials
  • Without strict scope validation, any token-rotation endpoint becomes a privilege escalation primitive

The CVSS score of 9.9 reflects the low complexity of exploitation, the network-accessible attack vector, and the complete confidentiality, integrity, and availability impact that results from obtaining operator.admin access.


Remediation

Immediate Action Required

Upgrade OpenClaw to version 2026.3.11 or later. This release adds scope-constraint validation to the device.token.rotate endpoint, ensuring that any requested scope set is strictly validated against the caller's current scope set before issuance.

Mitigations for Unpatched Deployments

  1. Disable or restrict the device.token.rotate endpoint at the reverse proxy or firewall level until the patch can be applied
  2. Audit existing tokens — review issued tokens for any operator.admin credentials that were obtained by operators who should only hold operator.pairing scope
  3. Revoke suspicious tokens — invalidate any tokens that appear to have been escalated beyond their original scope
  4. Monitor access logs for device.token.rotate calls that resulted in elevated-scope token issuance

Code-Level Fix Pattern

The remediation implemented in 2026.3.11 validates the requested scopes before issuance:

// Pseudocode — scope validation added in 2026.3.11
function rotateToken(caller_token, requested_scopes):
  caller_scopes = getTokenScopes(caller_token)

  // Validate: requested_scopes must be a subset of caller_scopes
  if not requested_scopes.isSubsetOf(caller_scopes):
    return Error(403, "Requested scopes exceed caller's current scope set")

  return issueToken(requested_scopes)

Impact Assessment

Impact AreaDescription
Privilege EscalationAny operator.pairing holder can obtain operator.admin tokens
Full Platform CompromiseAdmin scope grants access to all management functions
Data ExfiltrationAdmin access enables reading all device and user data
Configuration TamperingAttackers can modify platform settings and access controls
PersistenceAttacker-issued tokens can be used to create additional admin accounts
Exploit BarrierVery low — any valid pairing token is sufficient

Key Takeaways

  1. CVE-2026-32922 is a CVSS 9.9 critical privilege escalation flaw in OpenClaw prior to version 2026.3.11
  2. The device.token.rotate endpoint fails to enforce scope inheritance, allowing an operator.pairing token to be exchanged for an operator.admin token
  3. The attack requires only a valid low-privilege token and a single API call — no advanced techniques required
  4. Upgrade to OpenClaw 2026.3.11 immediately; organizations that cannot patch should disable or firewall the token rotation endpoint
  5. Any token issued via the rotation endpoint should be treated as potentially compromised until a token audit is completed

Sources

  • CVE-2026-32922 — NIST NVD
  • OpenClaw Security Advisory — 2026.3.11
#CVE-2026-32922#Privilege Escalation#OpenClaw#Token Abuse#CWE-269#Vulnerability#Critical

Related Articles

CVE-2026-22172: OpenClaw Critical Authorization Bypass via WebSocket Scope Elevation

A critical CVSS 9.9 authorization bypass in OpenClaw allows authenticated users to self-declare elevated scopes over WebSocket connections without...

6 min read

CVE-2026-25770: Wazuh Privilege Escalation to Root via Cluster Protocol File Write

A critical privilege escalation vulnerability (CVSS 9.1) in Wazuh versions 3.9.0–4.14.2 allows authenticated cluster nodes to overwrite the manager...

5 min read

CVE-2026-32924: OpenClaw Authorization Bypass via Feishu Chat Misclassification

A critical CVSS 9.8 authorization bypass in OpenClaw allows attackers to circumvent groupAllowFrom and requireMention protections in group chats by exploiting a Feishu reaction event misclassification that treats group messages as private conversations.

6 min read
Back to all Security Alerts