If you're running OpenClaw, you probably got hacked in the last week

Posted by NotFunnyVipul@reddit | sysadmin | View on Reddit | 119 comments

CVE-2026-33579 is actively exploitable and hits hard.

What happened: The /pair approve command doesn't check who is approving. So someone with basic pairing access (the lowest permission tier) can approve themselves for admin. That's it. Full instance takeover, no secondary exploit needed. CVSS 8.6 HIGH.

Why this matters right now:

The attack is trivial:

  1. Connect to an unauthenticated OpenClaw instance → get pairing access (no credentials needed)
  2. Register a fake device asking for operator.admin scope
  3. Approve your own request with /pair approve [request-id]
  4. System grants admin because it never checks if you are authorized to grant admin
  5. You now control the entire instance — all data, all connected services, all credentials

Takes maybe 30 seconds once you know the gap exists.

What you need to do:

  1. Check your version: openclaw --version. If it's anything before 2026.3.28, stop what you're doing
  2. Upgrade (one command: npm install openclaw@2026.3.28)
  3. Run forensics if you've been running vulnerable versions:
  4. List admin devices: openclaw devices list --format json and look for admins approved by pairing-only users
  5. Check audit logs for /pair approve events in the last week
  6. If registration and approval timestamps are seconds apart and approver isn't a known admin = you got hit