OpenClaw privilege escalation vulnerability (nvd.nist.gov)

by kykeonaut 256 comments 514 points
Read article View on HN

256 comments

[−] steipete 42d ago
OpenClaw creator here.

This was a privilege-escalation bug, but not "any random Telegram/Discord message can instantly own every OpenClaw instance."

The root issue was an incomplete fix. The earlier advisory hardened the gateway RPC path for device approvals by passing the caller's scopes into the core approval check. But the /pair approve plugin command path still called the same approval function without callerScopes, and the core logic failed open when that parameter was missing.

So the strongest confirmed exploit path was: a client that ALREADY HAD GATEWAY ACCESS and enough permission to send commands could use chat.send with /pair approve latest to approve a pending device request asking for broader scopes, including operator.admin. In other words: a scope-ceiling bypass from pairing/write-level access to admin.

This was not primarily a Telegram-specific or message-provider-specific bug. The bug lived in the shared plugin command handler, so any already-authorized command sender that could reach /pair approve could hit it. For Telegram specifically, the default DM policy blocks unknown outsiders before command execution, so this was not "message the bot once and get admin." But an already-authorized Telegram sender could still reach the vulnerable path.

The practical risk for this was very low, especially if OpenClaw is used as single-user personal assistant. We're working hard to harden the codebase with folks from Nvidia, ByteDance, Tencent and OpenAI.

[−] nightpool 42d ago
Can you speak a little bit more to the stats in the OP?

* 135k+ OpenClaw instances are publicly exposed

* 63% of those run zero authentication. Meaning the "low privilege required" in the CVE = literally anyone on the internet can request pairing access and start the exploit chain

Is this accurate? This is definitely a very different picture then the one you paint

[−] stingraycharles 42d ago
That’s surprising, as the OpenClaw installation makes it pretty difficult to run without auth and explicit device pairing (I don’t even know if that’s possible).
[−] bootsmann 42d ago
The problem is that a lot of users of OpenClaw use a chatbot to set it up for them so it has a habit of killing safety features if it runs into roadblocks due to user requests. This makes installations super heterogeneous.
[−] nightpool 41d ago
I agree—it looks like the OP didn't provide any sources for these numbers either. That's why I would have hoped that the original maintainer had a better set of metrics to dispute them. It doesn't seem like he does though :(
[−] ctoth 41d ago
Those numbers aren't in the CVE. You introduced them, attributed them to a source that doesn't contain them, and now you're disclaiming them. Where did they come from, and what was the goal of sharing them?
[−] nightpool 41d ago
The numbers were in the post when I clicked through and when I made the comment. It looks like the HN moderators have since changed the link for the post to go to the CVE entry. However, my comment was about the reddit thread, not the CVE entry.
[−] pacificpendant 41d ago
I’m not the person you’re talking to but the stats are copied from the second link in the post, the web archive one.
[−] steipete 41d ago
Honestly that seems like total guesswork. There's a lot of FUD going around, or people running portscans and assuming just because they detect a gateway on a port, that they can connect to it. That’s not the case.
[−] nightpool 41d ago
Definitely agree—that's why I hoped the openclaw maintainer would have been able to speak to those numbers and whether or not they were accurate.
[−] jeremie_strand 41d ago
[dead]
[−] blks 42d ago

> We're working hard to harden the codebase with folks from Nvidia, ByteDance, Tencent and OpenAI.

What exactly does this mean? You have contracts with these companies? People who work for them contributed sometimes in the past to openclaw repository?

[−] marscopter 42d ago
If I am not mistaken steipete works for OpenAI now as part of OpenClaw being acquired by them back in February.

NVIDIA is contributing to the security of OpenClaw via NemoClaw.[0]

Not sure about ByteDance and Tencent.

0. https://www.nvidia.com/en-us/ai/nemoclaw/

[−] j16sdiz 42d ago
[flagged]
[−] victorbjorklund 41d ago
And all American companies plant American malware in all software they work on.
[−] RIMR 41d ago
Can you point to any reputable reports or specific commits that suggest that these companies are trying to plant malware in OpenClaw?

Or did you just see "China" and decide it must be malicous?

(This is a rhetorical question, I already know it's the latter)

[−] steipete 41d ago
They both sponsor the OpenClaw Foundation and provide engineers to improve OpenClaw.
[−] thejarren 42d ago
Jensen mentioned on a podcast (sorry I don’t have a link on me, it was either the all in podcast or Lex Friedman) that they are helping support and harden on the security side, and that he considers it like the “iPhone moment”

Most of these larger players are interested in supporting anything that helps grow the ecosystem so broadly.

[−] fg3fgq 42d ago
Nvidia is willing to do anything to keep the hype going - there's a desperation to find a 'killer app'.
[−] just_once 42d ago
Nvidia, ByteDance, Tencent and OpenAI?! Wow!
[−] gigel82 42d ago
Good, hearty group right there. But how about Palantir, NSO Group, Flock and Axon? Aren't they lending a hand too?
[−] just_once 41d ago
Always good to name drop a near universally hated group.
[−] mvdtnz 42d ago
My reply which was not an attack was detached from this sub thread as an attack. All I did was ask a clarifying question about why Telegram and Discord were specifically called out in this reply despite not being mentioned by the OP at all. I'd still like an answer to this question.
[−] turadg 41d ago
[dead]
[−] doctorpangloss 42d ago
[flagged]
[−] consumer451 42d ago
I could not stop myself from looking at this user's submission history, looking for a ShowHN about Clawdbot. No such submission exists.

I can understand why, but given that OpenClaw has taken over the world, I find the lack of a ShowHN somewhat interesting.

[−] SeriousM 42d ago
[flagged]
[−] tao_oat 42d ago
Relevant: https://days-since-openclaw-cve.com/

Currently we're at 1.8 CVEs per day since OpenClaw launched!

[−] rvz 42d ago
OpenClaw has over 400+ security issues and vulnerabilities. [0]

Why on earth would you install something like that has access to your entire machine, even if it is a separate one which has the potential to scan local networks?

Who is even making money out of OpenClaw other than the people attempting to host it? I see little use out of it other than a way to get yourself hacked by anyone.

[0] https://github.com/openclaw/openclaw/security

[−] Meneth 42d ago
Text of the post has been [removed]. Original saved here: https://web.archive.org/web/20260403163241/https://old.reddi...
[−] petcat 42d ago
I don't use OpenClaw, but I still run my Claude Code and Codex as limited macOS user accounts and just have a script become-agent [cmd ...] that does some sudo stuff to run as the limited user so they don't have any of my environment or directory access, or really any system-level admin access at all. They can use and write to their home directories as usual, which makes things easier to configure since those CLI harnesses really like when $HOME is configured and works as expected.

It's a good compromise between running as me and full sandbox-exec. Multi-user Unix-y systems were designed for this kind of stuff since decades ago.

[−] Leomuck 42d ago
Well, such things were to be expected. It's easy to bash on all the people who haven't gotten the necessary IT understanding of securing such things. Of course, it's uber-dumb to run an unprotected instance. But at the same time, it's also quite cool that so many people can do interesting IT stuff now. I'm thinking basically it's a trade-off. Be able to do great stuff, live with the consequences of doing that without proper training. Like repairing your car yourself. You might have fun doing it, it might get you somewhere, but you have to accept that if you have no idea about cars, you just introduced a pretty big risk into your life (say if you replaced the brakes or something). But yea, security, privacy, fighting climate change, all very much on the decline - humans doing cool things, ignoring important things - we'll have to live with the consequences.
[−] niwtsol 42d ago
Title is a bit misleading, no? You have to have openclaw running on an open box. And the post even says "135k open instances" out of 500k running instances? so a bit clickbait-y
[−] reenorap 42d ago
The threads on that /r/sysadmin post sound exactly like every sysadmin I've ever worked with in my career.
[−] Simon321 42d ago
Only if your openclaw instance is publicly exposed on the internet... which is not the case for most people
[−] earnesti 42d ago
I don't think enabling admin on open internet is a default behaviour by any means?
[−] chatmasta 42d ago
I’m surprised people are still using OpenClaw. I assumed they’d have switched to Nanoclaw or Nemoclaw. Is OpenClaw just that much better, or is it all inertia?

(I’ve never used any of them.)

[−] plasticeagle 41d ago
Open Claw cannot be made "secure" by any normal definition of the word. Unless I'm very much mistaken, fundamentally it's a tool that lets LLMs do stuff.

So you take the output of an LLM, which is obviously impossibly to guarantee correct, and use that to choose a tool and execute it. Like, send an email or whatever. And you take the input for that LLM not only from prompts, and various files, but also your system and random stuff you download from the internet.

I am telling you people, this is lunacy. No good can come of this.

[−] ritcgab 42d ago
Isn't OpenClaw itself a privilege escalation?
[−] kube-system 42d ago
If someone could forward the SSH port from my VPS to access my instance, I already had bigger problems.
[−] throwatdem12311 41d ago
Steinberger has a vested interest in protecting his, and OpenAIs reputation from the ramifications of serious in-the-wild exploits like this.

Or inviting any legal or regulatory scrutiny.

They don’t even read the code in any serious capacity so excuse me for not taking any assessment of the situation from him too seriously. Might as well just ask Claude Code to assess it yourself.

Welcome to the world vibe coding created. The fun is only just beginning.

[−] sva_ 42d ago

> 4. System grants admin because it never checks if you are authorized to grant admin

Shipping at the speed of inference for real.

[−] vasco 42d ago

> We're working hard to harden the codebase with folks from Nvidia, ByteDance, Tencent and OpenAI.

But coding is solved? Why do you need those guys if all they do is use claude code? Just have it solve it overnight. You forgot to prompt "make it secure pls"?

[−] acedTrex 41d ago
Who cares man, the sloppiest and shittiest software ever written has yet another CVE. This is not worth discussing.
[−] rossjudson 42d ago
With respect...Security through obscurity is dead. We are approaching the point where only formally verified (for security) systems can be trusted. Every possible attack will be attempted. Every opening will be exploited, and every useful combination of those exploits will be done.

LLMs are patient, tireless, capable of rigorous opsec, and effectively infinite in number.

[−] throwatdem12311 42d ago
Think of all the people that are too ignorant to even understand the basics of any of this that are running OpenClaw. They will be completely unaware and attackers can easily hide their tracks by changing system prompts (among plenty of other things).

This is bad.

[−] sunaookami 42d ago
Honest question: What do people actually USE OpenClaw for? The most common usage seems to be "it reads your emails!", that's the exact opposite of "exciting"...
[−] machinecontrol 42d ago
The root issue is that OpenClaw is 500K+ lines of vibe coded bloat that's impossible to reason about or understand.

Too much focus on shipping features, not enough attention to stability and security.

As the code base grows exponentially, so does the security vulnerability surface.

[−] jeremie_strand 41d ago
[dead]
[−] Serberus 40d ago
[dead]
[−] redoh 42d ago
[flagged]
[−] hyperlambda 42d ago
[flagged]
[−] roangeller 42d ago
[flagged]
[−] RodMiller 42d ago
[dead]
[−] n1tro_lab 42d ago
[flagged]