CVE-2026-33575 in OpenClawinformation

Résumé (Anglaise)

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside the intended one-time pairing flow.

Responsable

VulnCheck

Réserver

23/03/2026

Divulgation

29/03/2026

Entrées

Montrer plus

Do you know our Splunk app?

Download it now for free!