OpenClaw's `device.token.rotate` function incorrectly mints or preserves device tokens carrying roles and scopes that have not undergone the required pairing approval workflow, constituting an authorization bypass (CWE-863). Although OpenClaw is a user-controlled local assistant — not a multi-tenant service — this matters to security teams because unauthorized role elevation in an AI agent can allow it to operate well beyond its approved capability boundary, silently violating the principle of least privilege. No EPSS data is available, the vulnerability is absent from CISA KEV, and no public exploits or scanner templates exist, indicating low immediate exploitation pressure; however, the same OpenClaw ecosystem has a documented history of malicious third-party skills exfiltrating credentials (AIID #1368), making any authorization gap in this stack higher-risk than it would be in isolation. Upgrade to openclaw 2026.4.8 and audit all device tokens issued under versions ≤ 2026.04.01 to confirm their roles match approved pairings.
Risk Assessment
Medium risk overall, with an elevated concern in environments where OpenClaw agents are granted access to sensitive systems or credentials. The trust model is explicitly scoped to a single-user local assistant, which limits blast radius compared to a server-side multi-tenant product. However, CWE-863 in an AI agent means an agent could self-escalate capabilities without the user having explicitly approved that role, which undermines the foundational control of agentic permission governance. The absence of a CVSS vector, KEV listing, and public exploit corroborates a moderate rather than critical urgency, but the patch is available and low-cost to apply.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | npm | < 2026.4.8 | 2026.4.8 |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
- Patch immediately: upgrade openclaw (npm) to 2026.4.8 (commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5).
- Audit existing tokens: enumerate all device tokens issued by affected versions and verify each token's roles match the roles explicitly approved during pairing; revoke any token with unexpected scopes.
- Re-pair devices: for any device whose token cannot be audited, revoke and re-pair under the patched version.
- Least-privilege review: confirm OpenClaw agent roles are scoped to only what is operationally required.
- Monitor token issuance: log all `device.token.rotate` calls and alert on role additions that differ from the last approved pairing record.
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Frequently Asked Questions
What is GHSA-whf9-3hcx-gq54?
OpenClaw's `device.token.rotate` function incorrectly mints or preserves device tokens carrying roles and scopes that have not undergone the required pairing approval workflow, constituting an authorization bypass (CWE-863). Although OpenClaw is a user-controlled local assistant — not a multi-tenant service — this matters to security teams because unauthorized role elevation in an AI agent can allow it to operate well beyond its approved capability boundary, silently violating the principle of least privilege. No EPSS data is available, the vulnerability is absent from CISA KEV, and no public exploits or scanner templates exist, indicating low immediate exploitation pressure; however, the same OpenClaw ecosystem has a documented history of malicious third-party skills exfiltrating credentials (AIID #1368), making any authorization gap in this stack higher-risk than it would be in isolation. Upgrade to openclaw 2026.4.8 and audit all device tokens issued under versions ≤ 2026.04.01 to confirm their roles match approved pairings.
Is GHSA-whf9-3hcx-gq54 actively exploited?
No confirmed active exploitation of GHSA-whf9-3hcx-gq54 has been reported, but organizations should still patch proactively.
How to fix GHSA-whf9-3hcx-gq54?
1. Patch immediately: upgrade openclaw (npm) to 2026.4.8 (commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5). 2. Audit existing tokens: enumerate all device tokens issued by affected versions and verify each token's roles match the roles explicitly approved during pairing; revoke any token with unexpected scopes. 3. Re-pair devices: for any device whose token cannot be audited, revoke and re-pair under the patched version. 4. Least-privilege review: confirm OpenClaw agent roles are scoped to only what is operationally required. 5. Monitor token issuance: log all `device.token.rotate` calls and alert on role additions that differ from the last approved pairing record.
What systems are affected by GHSA-whf9-3hcx-gq54?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, local AI agent deployments, AI agent tool integrations.
What is the CVSS score for GHSA-whf9-3hcx-gq54?
No CVSS score has been assigned yet.
Technical Details
NVD Description
## Impact OpenClaw `device.token.rotate` mints tokens for unapproved roles, bypassing device role-upgrade pairing. Device token rotation could mint or preserve roles/scopes that had not gone through the intended pairing approval. OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<= v2026.04.01` - Patched versions: `2026.4.8` ## Fix The issue was fixed on `main` and is available in the patched npm version listed above. The verified fixed tree is commit `d7c3210cd6f5fdfdc1beff4c9541673e814354d5`. ## Verification The fix was re-checked against `main` before publication, including targeted regression tests for the affected security boundary. ## Credits Thanks @nicky-cc of Tencent zhuque Lab ([https://github.com/Tencent/AI-Infra-Guard](https://github.com/Tencent/AI-Infra-Guard)) for reporting.
Exploitation Scenario
A threat actor who has achieved foothold on a user's machine — or a malicious OpenClaw skill (analogous to the AMOS stealer scenario in AIID #1368) — invokes `device.token.rotate` on a device that was originally paired with a low-privilege role. Under the vulnerable code path, the rotation produces a token that includes higher-privileged scopes (e.g., filesystem write or credential-store access) that the user never explicitly approved. The actor then uses the inflated token to instruct the OpenClaw agent to exfiltrate local secrets, execute code, or pivot to other tools the agent has access to — all while appearing to operate within a legitimately issued device token.
Weaknesses (CWE)
References
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert