OpenClaw versions prior to 2026.3.1 fail to pin executable identity for non-path-like argv[0] tokens in system.run approvals, allowing post-approval executable rebind attacks. Attackers can modify PATH resolution after approval to execute a different binary than the operator approved, enabling arbitrary command execution.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/security/advisories/GHSA-q399-23r3-hfx4 | Mitigation Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-executable-rebind-via-unbound-path-token-in-system-run-approvals | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-19 02:16
Updated : 2026-03-19 18:49
NVD link : CVE-2026-31997
Mitre link : CVE-2026-31997
CVE.ORG link : CVE-2026-31997
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
