BACK_TO_FEEDAICRIER_2
OpenClaw hit by critical admin exploit
OPEN_SOURCE ↗
HN · HACKER_NEWS// 8d agoSECURITY INCIDENT

OpenClaw hit by critical admin exploit

OpenClaw versions before 2026.3.28 are vulnerable to CVE-2026-33579, a critical flaw allowing unauthorized users to gain administrative control by self-approving pairing requests. Users should upgrade to version 2026.3.28 immediately and audit logs for suspicious activity.

// ANALYSIS

The OpenClaw exploit is a textbook example of "trust but don't verify" in autonomous agent security, highlighting the risks of granting deep system permissions to experimental frameworks. The /pair approve flaw is devastating because it bypasses the entire security model, turning a local assistant into a potential remote access trojan. This incident underscores the danger of rapid viral growth in open-source projects before basic security primitives are hardened, especially as autonomous agents gain shell and browser control.

// TAGS
openclawagentai-codingopen-sourcesafety

DISCOVERED

8d ago

2026-04-03

PUBLISHED

8d ago

2026-04-03

RELEVANCE

9/ 10

AUTHOR

kykeonaut