OpenClaw gives users yet another reason to be freaked out about security



For more than a month, security practitioners have been warning about the perils of using OpenClaw, the viral AI agentic tool that has taken the development community by storm. A recently fixed vulnerability provides an object lesson for why.

OpenClaw, which was introduced in November and now boasts 347,000 stars on Github, by design takes control of a user’s computer and interacts with other apps and platforms to assist with a host of tasks, including organizing files, doing research, and shopping online. To be useful, it needs access—and lots of it—to as many resources as possible. Telegram, Discord, Slack, local and shared network files, accounts, and logged in sessions are only some of the intended resources. Once the access is given, OpenClaw is designed to act precisely as the user would, with the same broad permissions and capabilities.

Severe impact

Earlier this week, OpenClaw developers released security patches for three high-severity vulnerabilities. The severity rating of one in particular, CVE-2026-33579, is rated from 8.1 to 9.8 out of a possible 10 depending on the metric used—and for good reason. It allows anyone with pairing privileges (the lowest-level permission) to gain administrative status. With that, the attacker has control of whatever resources the OpenClaw instance does.

“The practical impact is severe,” researchers from AI app-builder Blink wrote. “An attacker who already holds operator.pairing scope—the lowest meaningful permission in an OpenClaw deployment—can silently approve device pairing requests that ask for operator.admin scope. Once that approval goes through, the attacking device holds full administrative access to the OpenClaw instance. No secondary exploit is needed. No user interaction is required beyond the initial pairing step.”

The post continued: “For organizations running OpenClaw as a company-wide AI agent platform, a compromised operator.admin device can read all connected data sources, exfiltrate credentials stored in the agent’s skill environment, execute arbitrary tool calls, and pivot to other connected services. The word ‘privilege escalation’ undersells this: the outcome is full instance takeover.”



Source link

  • Related Posts

    Apple will again appeal to the Supreme Court in battle with Epic Games

    The legal battle between Epic Games and Apple is escalating once again. For a second time, the warring factions are going straight to the top of the judicial system. Apple…

    2025 Income Tax Returns Are Due Next Week. Get All the Details on Tax Deadlines

    If you’ve been dreading the task of completing and filing your 2025 income taxes, you’re not alone. The IRS says that 20% to 25% of US taxpayers wait until the…

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    You Missed

    Working on Rooster Was Like Friday Night Lights

    Working on Rooster Was Like Friday Night Lights

    Trump administration to end civil rights settlements protecting trans students

    Trump administration to end civil rights settlements protecting trans students

    Liberals set to descend on Montreal to debate policy, talk campaign tactics ahead of high-stakes byelections

    Liberals set to descend on Montreal to debate policy, talk campaign tactics ahead of high-stakes byelections

    Mag 7 needs Q2 revenue growth in order to ‘justify’ massive capex

    Mag 7 needs Q2 revenue growth in order to ‘justify’ massive capex

    Poilievre says Trump should avoid ‘permanent quagmire’ in Iran

    County Championship: Bartlett heroics for Northants thwart Lancashire

    County Championship: Bartlett heroics for Northants thwart Lancashire