CVE-2026-35638
Privilege Escalation in OpenClaw Control UI via Unauthenticated Scope Abuse
Publication date: 2026-04-09
Last updated on: 2026-04-15
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.22 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-286 | The product does not properly manage a user within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenClaw versions before 2026.3.22 and involves a privilege escalation issue in the Control UI. It allows unauthenticated sessions to keep self-declared privileged scopes without verifying the device identity. Attackers can exploit a device-less allow path in the trusted-proxy mechanism to maintain elevated permissions by declaring arbitrary scopes, effectively bypassing device identity verification requirements.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized privilege escalation, allowing attackers to gain elevated permissions without proper authentication or device verification. This can result in unauthorized access to sensitive functions or data within the system, potentially compromising confidentiality, integrity, and availability.