GHSA-5wj5-87vq-39xm: openclaw: auth bypass enables exec escalation on reconnect
GHSA-5wj5-87vq-39xm HIGHA previously paired node in OpenClaw can reconnect with an expanded command set — including exec-capable commands — without triggering the mandatory operator/admin re-pairing flow, effectively bypassing the scope enforcement that gates privileged operations. This authentication bypass (CWE-288) turns any compromised or rogue node with historical pairing credentials into a lateral movement vector with arbitrary execution capability inside the local assistant's trust boundary. OpenClaw already carries 60 CVEs in the same package, and AIID #1368 documents an active malicious skill distribution campaign on the same platform that exfiltrated credentials, meaning threat actors already have demonstrated tooling against this ecosystem. Patch to 2026.4.8 immediately; audit all paired node histories and revoke/re-pair any node whose pairing predates this fix.
Risk Assessment
High risk for teams deploying openclaw in AI agent pipelines or as a local assistant with multi-node architectures. The bypass requires only a previously paired node — a low bar in environments where pairing is routine — and immediately yields exec-level command access. No EPSS or KEV data is available, but the combination of a documented attacker ecosystem (AIID #1368), CWE-288 class exploitability, and command execution impact elevates this beyond a typical authentication weakness. The local trust model boundary limits internet-wide exposure but does not reduce risk for targeted environments.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | npm | < 2026.4.8 | 2026.4.8 |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
- Patch openclaw to version 2026.4.8 immediately — this is the only complete fix.
- Audit pairing logs for all nodes: identify any reconnections that occurred post-initial-pairing, especially those that subsequently invoked exec-level commands.
- Revoke and force re-pair all currently paired nodes after patching to eliminate any nodes that may have already escalated.
- Until patched, restrict network access to openclaw instances so only explicitly trusted hosts can initiate reconnections.
- Review installed skills against the ClawHub abuse patterns documented in AIID #1368 — malicious skills may have exploited this bypass.
- Enable command execution logging at the OS level to detect anomalous exec patterns from the openclaw process.
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Frequently Asked Questions
What is GHSA-5wj5-87vq-39xm?
A previously paired node in OpenClaw can reconnect with an expanded command set — including exec-capable commands — without triggering the mandatory operator/admin re-pairing flow, effectively bypassing the scope enforcement that gates privileged operations. This authentication bypass (CWE-288) turns any compromised or rogue node with historical pairing credentials into a lateral movement vector with arbitrary execution capability inside the local assistant's trust boundary. OpenClaw already carries 60 CVEs in the same package, and AIID #1368 documents an active malicious skill distribution campaign on the same platform that exfiltrated credentials, meaning threat actors already have demonstrated tooling against this ecosystem. Patch to 2026.4.8 immediately; audit all paired node histories and revoke/re-pair any node whose pairing predates this fix.
Is GHSA-5wj5-87vq-39xm actively exploited?
No confirmed active exploitation of GHSA-5wj5-87vq-39xm has been reported, but organizations should still patch proactively.
How to fix GHSA-5wj5-87vq-39xm?
1. Patch openclaw to version 2026.4.8 immediately — this is the only complete fix. 2. Audit pairing logs for all nodes: identify any reconnections that occurred post-initial-pairing, especially those that subsequently invoked exec-level commands. 3. Revoke and force re-pair all currently paired nodes after patching to eliminate any nodes that may have already escalated. 4. Until patched, restrict network access to openclaw instances so only explicitly trusted hosts can initiate reconnections. 5. Review installed skills against the ClawHub abuse patterns documented in AIID #1368 — malicious skills may have exploited this bypass. 6. Enable command execution logging at the OS level to detect anomalous exec patterns from the openclaw process.
What systems are affected by GHSA-5wj5-87vq-39xm?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, local AI assistants, multi-node AI pipelines.
What is the CVSS score for GHSA-5wj5-87vq-39xm?
No CVSS score has been assigned yet.
Technical Details
NVD Description
## Impact Node Pairing Reconnect Command Escalation Bypasses operator.admin Scope Requirement. A previously paired node could reconnect with a broader command set, including exec-capable commands, without forcing the operator/admin re-pairing path. OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<=2026.4.5` - Patched versions: `2026.4.8` ## Fix The issue was fixed on `main` and is available in the patched npm version listed above. The verified fixed tree is commit `d7c3210cd6f5fdfdc1beff4c9541673e814354d5`. ## Verification The fix was re-checked against `main` before publication, including targeted regression tests for the affected security boundary. ## Credits Thanks @zsxsoft and @KeenSecurityLab for reporting.
Exploitation Scenario
An attacker who has compromised a peripheral device previously paired to an OpenClaw local assistant (e.g., via a malicious skill as documented in AIID #1368) initiates a reconnect from that device. The unpatched reconnect handler issues an expanded command set without verifying operator/admin scope, granting the attacker exec-capable commands. The attacker then uses these commands to enumerate the host filesystem, extract stored credentials or API keys from the local assistant's configuration, and establish persistence — all within the legitimate communication channel of the trusted pairing. This attack requires no user interaction after the initial compromise of a paired node.
References
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert