CVE-2026-33575 in OpenClawinfo

Zusammenfassung (Englisch)

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside the intended one-time pairing flow.

Zuständig

VulnCheck

Reservieren

23.03.2026

Veröffentlichung

29.03.2026

Einträge

Zeige mehr

Do you know our Splunk app?

Download it now for free!