CVE-2026-32065

OpenClaw versions prior to 2026.2.25 contain an approval-integrity bypass vulnerability in system.run where rendered command text is used as approval identity while trimming argv token whitespace, but runtime execution uses raw argv. An attacker can craft a trailing-space executable token to execute a different binary than what the approver displayed, allowing unexpected command execution under the OpenClaw runtime user when they can influence command argv and reuse an approval context.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

No history.

Information

Published : 2026-03-21 01:17

Updated : 2026-03-24 21:09


NVD link : CVE-2026-32065

Mitre link : CVE-2026-32065

CVE.ORG link : CVE-2026-32065


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-436

Interpretation Conflict