OpenClaw: Pairing setup codes exposed long-lived shared gateway credentials instead of short-lived bootstrap tokens
Moderate severity
GitHub Reviewed
Published
Mar 13, 2026
in
openclaw/openclaw
•
Updated Mar 13, 2026
Description
Published to the GitHub Advisory Database
Mar 13, 2026
Reviewed
Mar 13, 2026
Last updated
Mar 13, 2026
Summary
OpenClaw pairing setup codes generated by
/pairandopenclaw qrembedded the configured shared gateway token or password directly in the setup payload. Anyone who obtained that code from chat history, logs, screenshots, or copied QR payloads could recover the long-lived shared credential.Impact
An attacker with access to a leaked setup code could reuse the shared gateway credential outside the intended one-time pairing flow.
Affected versions
openclaw<= 2026.3.11Patch
Fixed in
openclaw2026.3.12. Setup codes now carry short-lived bootstrap tokens that are only valid for the initial device bootstrap exchange. Update to2026.3.12or later and rotate any previously exposed shared gateway credentials if setup codes may have leaked.References