CVE-2026-32987: Privilege Escalation in OpenClaw via Bootstrap Code Replay
Security Bulletin CVE-2026-32987 - OpenClaw Bootstrap Code Replay Leading to Administrative Access Overview CVE-2026-32987 is a critical vulnerability affecting OpenClaw that allows an unauthenticated attacker to achieve full administrative access through repeated replay of bootstrap pairing codes. The issue stems from improper enforcement of single-use validation during the device onboarding process. This allows an attacker to reuse a valid bootstrap code multiple times and progressively escalate privileges. This vulnerability is network exploitable, requires no authentication, and does not require user interaction. Affected Systems OpenClaw versions prior to 2026.3.13 Any environment leveraging OpenClaw for device onboarding or orchestration should be considered at risk if not fully patched. Severity Assessment CVSS Classification: Critical Attack Vector: Network Authentication Required: None User Interaction: None Impact: Full administrative compromise This vulnerability provides a direct path to operator.admin-level access, effectively granting complete control of the platform. Technical Details The vulnerability is categorized under: CWE-294: Authentication Bypass…
