Bug Bounty And Vuln HuntingVuln Item

OpenClaw privilege escalation via pair approve command

April 3, 2026r/cybersecurity

In r/cybersecurity, OpenClaw is criticized after an actively exploited bug lets low permission users self approve to admin, reinforcing the community norm to avoid running immature prototype software near real assets.

If you're running OpenClaw, you probably got hacked in the last week CVE-2026-33579 is actively exploitable and hits hard.
The /pair approve command doesn't check who is approving. So someone with basic pairing access (the lowest permission tier) can approve themselves for admin.
OpenClaw feels like some snake oil - and I only say that because I don’t want to label it malicious off rip, but if the premise of what OpenClaw is doesn’t tell you all you need to know.. this thing has been nothing but security issue after security issue.
The /pair approve command doesn't check who is approving.
So someone with basic pairing access (the lowest permission tier) can approve themselves for admin. That's it. Full instance takeover, no secondary exploit needed.
So someone with basic pairing access (the lowest permission tier) can approve themselves for admin.
r/cybersecurity
privilege escalationremote takeovercvecode executionprivilege escalationattack surface

See what experts are saying right now

This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new expert voices, debates, and emerging ideas.

← Back to Cyber Security