OpenClaw hit by critical admin exploit
OpenClaw versions before 2026.3.28 are vulnerable to CVE-2026-33579, a critical flaw allowing unauthorized users to gain administrative control by self-approving pairing requests. Users should upgrade to version 2026.3.28 immediately and audit logs for suspicious activity.
The OpenClaw exploit is a textbook example of "trust but don't verify" in autonomous agent security, highlighting the risks of granting deep system permissions to experimental frameworks. The /pair approve flaw is devastating because it bypasses the entire security model, turning a local assistant into a potential remote access trojan. This incident underscores the danger of rapid viral growth in open-source projects before basic security primitives are hardened, especially as autonomous agents gain shell and browser control.
DISCOVERED
8d ago
2026-04-03
PUBLISHED
8d ago
2026-04-03
RELEVANCE
AUTHOR
kykeonaut